Blog Posts Tagged with "Privacy"
September 03, 2012 Added by:Rebecca Herold
At the end of July, Twitter suspended the account of Guy Adams, a reporter for the UK’s Independent, after he posted the corporate email address of Jim Bell, Producer of NBC Olympics, and said less than flattering things about his expectations for how NBC would do in their Olympics coverage.
August 30, 2012 Added by:Electronic Frontier Foundation
There’s long been ample evidence the NSA has been unlawfully collecting Americans' communications since the passage of the FISA Amendments Act. As the New York Times reported in 2009, the NSA was still collecting purely domestic communications of Americans' in a "significant and systemic" way...
August 29, 2012 Added by:Danny Lieberman
As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...
August 28, 2012 Added by:Christopher Rodgers
Management sometimes assumes that when they have identified and summarized the top risks to their organization through a Strategic Risk Assessment, that they have implemented ERM. This is simply not the case. Strategic Risk Assessment is an important component of ERM and usually a starting point, but not a final destination...
August 27, 2012 Added by:David Navetta
The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...
August 26, 2012 Added by:Electronic Frontier Foundation
The bill requires law enforcement to obtain a search warrant anytime it requests location information from an electronic device. It codifies the Supreme Court's decision from earlier this year that the installation of a GPS device for purposes of an investigation requires a search warrant...
August 24, 2012 Added by:Theresa Payton
Facebook’s software isn’t just about placing a name with a face. If you think about how people use the like button, connect to groups, connect to each other, a tagged photo gives additional context. Hackers would love to have this information about you...
August 21, 2012 Added by:Rebecca Herold
Bottom line for all organizations, from the largest to the smallest: You need to establish messaging policies that clearly communicate that all emails sent through the company email system are subject to monitoring, and that no one using the system should have any expectation of privacy for the messages...
August 20, 2012 Added by:Danny Lieberman
EHR interconnected with HIE systems have a big threat surface, because of big, very complex software systems with a large number of attacker entry points. Healthcare system vulnerabilities are compounded since everyone is using the same technology from Microsoft and following the same HIPAA compliance checklists...
August 20, 2012 Added by:David Navetta
Although privacy advocates and federal regulators and legislators have primarily been focusing on consumer privacy issues, such as behavioral advertising and data mining, the significant changes in workplace privacy protections demand continued vigilance from employers...
August 19, 2012 Added by:Electronic Frontier Foundation
The public has been pushing back on broad use of drones by law enforcement. At the request of reporters, advocacy organizations and city councils, public agencies have been required to justify their drone purchases and develop clear policies on when and under what conditions they will use drones for surveillance...
August 17, 2012 Added by:Theresa Payton
It’s everyone’s worst night nightmare - everything digital in your life gets wiped out. Your phone, your computer, your tablet, every email address, social network profile. It really does happen, and most of you probably didn’t know that even techies and security experts worry about this happening to them...
August 14, 2012 Added by:Rebecca Herold
Every year or so, an otherwise smart information security professional publishes some really bad information security advice about how awareness and training is a waste of time and money. Bottom line for all organizations: Humans have always been and will always be the weakest link in security...
August 14, 2012 Added by:Brent Huston
"Watch the scams and traps that are strewn like land mines throughout the site. Watch the free give-aways, be wary of clicking on pictures and videos and look carefully at any messages that contain links or suggest web sites to visit. Also, be VERY careful about ‘friends’ of friends..."
August 13, 2012 Added by:Robert Siciliano
Mobile devices are on the move, meaning they can more easily be lost or stolen and their screens and keyboards are easier targets for “over the shoulder” browsing. When we lose our phones, we think about the pain and cost of replacing the device. But that’s just the tip of the iceberg...
August 09, 2012 Added by:Danny Lieberman
Health information exchanges (HIE) enable the sharing of health records by physicians and other providers, enabling my family physician to see the results without getting up from her desk or without me shlepping paper or CD. Unfortunately, HIE are being modeled after the retail industry supply-chain model...
How to Manage Secure Communications in M2M E... Charles Devon on 03-05-2015
Seven “Sins” of Cyber Security... John Terry on 03-05-2015
Update 3: Hackers May Leak Norton Antivirus ... Jhun Astillero on 03-05-2015