General Legal

59d9b46aa00c70238bb89056cfeb96c0

Managing Foreign Business Partners and the FCPA

October 15, 2010 Added by:Thomas Fox

The Wall Street Journal reported that the US Department of Justice was investigating allegations of possible bribery in Yemen by Schlumberger Ltd., in connect with their 2002 agreement with the Yemen government to create a national exploration data-bank for the country’s oil industry...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

A Cloud Computing Customer Bill of Rights

October 13, 2010 Added by:David Navetta

This document should be viewed less as a universal mandate, and more as a tool for cloud customers and providers to engage in spirited debate about the issues addressed in this Bill of Rights. This is a work in a progress and we invite you to submit your ideas on additional “rights” that we should include as well as any comments and criticisms on the current listing...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Examining FCPA Investigation Protocols

September 29, 2010 Added by:Thomas Fox

Detailed written procedure to ensure there is complete transparency on the rights and obligations of all parties once an allegation is made. This allows the Compliance Department to have not only the flexibility but also the responsibility to deal with such matters...

Comments  (0)

A6a8f6bad925fe4167d82a398acc0d10

GPS Data, Location Tracking and Privacy Expectations

September 28, 2010 Added by:Stephen Gantz

Anyone reviewing the recent and often conflicting or inconsistent judicial rulings on the collection and use of location data, privacy expectations and the corresponding applicability of the 4th Amendment to such data may depend on the specifics of a given situation...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Maine Supreme Court Ends Hannaford Breach Suit

September 26, 2010 Added by:David Navetta

Regardless of the potential flaws in this decision, this decision adds another significant court to those that fail to recognize damages in a data breach lawsuit. At this point, it is unclear whether the plaintiffs will ever achieve a victory on this issue...

Comments  (0)

A6a8f6bad925fe4167d82a398acc0d10

Geo-Location Tracking Data and Your Privacy

September 24, 2010 Added by:Stephen Gantz

The divergence of several federal Circuit Courts on matters central to this debate raises the likelihood that the Supreme Court will need to weigh in on the issues, although it is entirely possible that a case that makes it to that level will involve cell phone tower location information...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Reductions in FCPA Fines

September 04, 2010 Added by:Thomas Fox

Using a regression analysis, Hinchey concluded that those companies which did so voluntarily paid higher fines than companies which did not self disclose their FCPA violations to the DOJ. This evidence was contrary to the conventional wisdom that a company receives a benefit from self-disclosure...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Court Finds Bank Security Was Reasonable

August 31, 2010 Added by:David Navetta

Ironically, the Court found that Comerica had utilized commercially reasonable security procedures. However, that ruling had more to do with the language in Comerica’s contracts than an actual substantive analysis of security procedures. Take a closer look at the Court’s ruling...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Inside the Perplexities of Enterprise Privacy Policies

April 01, 2010 Added by:Rebecca Herold

An important consideration with information security incidents is identifying if personally identifiable information (PII) is involved. If it is, then the privacy breach response teamneeds to be put into action to determine whether or not an actual privacy breach occurred.

Comments  (0)

34200746591339726df9791b17bc885c

In Rebuke of China

February 02, 2010 Added by:Tom Schram

In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write:  “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...

Comments  (3)

B32b392ce3a707f05f4838c48c67d9cf

Good enough security?

October 29, 2009 Added by:Christopher Hudel

We have had 802.1x -- CISCO + Active Directory Integration --  in place for over a year know and it is largely a success; windows systems automatically obtain machine certificates (machines automatically receive certificates when they join the domain), supplicants exist for our IP Phones, and those devices (i.e.: printers)  that are currently incapable of 802.1x are split off in a tightl...

Comments  (2)

Page « < 10 - 11 - 12 - 13 - 14 > »