March 31, 2011 Added by:David Navetta
The Act seeks to establish standards to govern the use and disclosure of utility data (including personal information) by electric utilities, and requires electric utility companies to maintain the confidentiality of customer data and allow customers to access the data...
March 27, 2011 Added by:Robert Siciliano
It has become apparent that the conveniences of technology have outpaced consumers’ security intelligence. It is possible to secure systems in a way that will defeat most criminal activity, but that level of security comes with inconveniences that the consumer may not be equipped to handle...
March 26, 2011 Added by:Theresa Payton
On Guard Online states that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for invasion of privacy. This age group needs more education about the dangers of sharing too much information...
March 25, 2011 Added by:David Navetta
Consider the relatively hostile regulatory and legal environment that Internet tracking companies currently face. The WSJ's year-long What They Know investigation into online tracking exposed a fast-growing network of hundreds of companies that collect highly personal details about Internet users...
March 25, 2011 Added by:Headlines
"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."
March 20, 2011 Added by:David Navetta
Companies are well advised to take proactive approach to compliance with privacy and information security laws, regulations, guidelines and best practices. The FTC expects businesses to collect, use, disclose and process personal information in a fair and transparent way...
March 18, 2011 Added by:Headlines
"If the company cannot address and resolve these issues for those who are seeking secure communications, then vulnerable users will continue to be exposed to avoidable risks. Skype's misleading security assurances continue to expose users around the world to unnecessary and dangerous risk..."
March 17, 2011 Added by:Headlines
The new feature allows users the option to "Always Use HTTPS". Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by Firesheep attackers when logging in to their accounts over unencrypted Wi-Fi connections...
March 15, 2011 Added by:Headlines
US Magistrate Judge Theresa Buchanan has granted a Department of Justice request to access information in the Twitter accounts of WikiLeak's Julian Assange and several supporters in an ongoing criminal investigation of the whistleblower organization...
March 14, 2011 Added by:David Navetta
Privacy-related lawsuits are on the rise, and this time Amazon.com is the target. On March 2, 2011, two named plaintiffs filed a class-action lawsuit alleging that Amazon circumvents browser privacy settings to collect users’ personal information without permission and shares the information with third parties...
March 14, 2011 Added by:Headlines
“Twitter has engaged in a number of practices that, taken together, failed to provide reasonable and appropriate security to: prevent unauthorized access to nonpublic user information and honor the privacy choices exercised by its users in designating certain tweets as nonpublic..."
March 09, 2011 Added by:Headlines
Users are asked to allow the service's application to interface with their LinkedIn, Facebook, and Twitter accounts. According to Cluley's research, potentially thousands of people have already done so. The problem is, no one is entirely sure what Connect.me is...
March 07, 2011 Added by:Robert Siciliano
"Step out your front door and you could be captured in a high-resolution photograph taken from the air or street by Google or Microsoft... Drive down a city thoroughfare, cross a toll bridge, or park at certain shopping malls and your license plate will be recorded and time-stamped...”
March 07, 2011 Added by:Headlines
A central issue is the inability of new communications platforms to collect and store the kind of data law enforcement needs to pursue indictments, and current laws do not require the service providers to store the information. That may all change soon...
March 03, 2011 Added by:David Navetta
If your organization does not have a privacy program in place, now is the time to act. Legal compliance function, vendor management and appropriate security provisions in vendor and customer agreements are just a few of the hallmarks of a program that could help avoid enforcement actions...
February 25, 2011 Added by:Robert Siciliano
Security Risks of Telecommuting... Marek Hudczak on 08-18-2014
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 08-16-2014