Blog Posts Tagged with "Privacy"

65be44ae7088566069cc3bef454174a7

Are Emails of Execs from Public Companies Private?

September 03, 2012 Added by:Rebecca Herold

At the end of July, Twitter suspended the account of Guy Adams, a reporter for the UK’s Independent, after he posted the corporate email address of Jim Bell, Producer of NBC Olympics, and said less than flattering things about his expectations for how NBC would do in their Olympics coverage.

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

NSA Still Warrantlessly Wiretapping Americans

August 30, 2012 Added by:Electronic Frontier Foundation

There’s long been ample evidence the NSA has been unlawfully collecting Americans' communications since the passage of the FISA Amendments Act. As the New York Times reported in 2009, the NSA was still collecting purely domestic communications of Americans' in a "significant and systemic" way...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Ultimate Breach of Patient Privacy: Real-Time Death on Video

August 29, 2012 Added by:Danny Lieberman

As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...

Comments  (1)

82ac4cd789b46af43c0cde730625317e

Why Data Security and Enterprise Risk Management are Important

August 28, 2012 Added by:Christopher Rodgers

Management sometimes assumes that when they have identified and summarized the top risks to their organization through a Strategic Risk Assessment, that they have implemented ERM. This is simply not the case. Strategic Risk Assessment is an important component of ERM and usually a starting point, but not a final destination...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Seeks Comment on Proposed Revisions to COPPA Rule

August 27, 2012 Added by:David Navetta

The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

California Location Privacy Bill Passes Assembly

August 26, 2012 Added by:Electronic Frontier Foundation

The bill requires law enforcement to obtain a search warrant anytime it requests location information from an electronic device. It codifies the Supreme Court's decision from earlier this year that the installation of a GPS device for purposes of an investigation requires a search warrant...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

If Facial Recognition Creeps You Out, What You Can Do About It

August 24, 2012 Added by:Theresa Payton

Facebook’s software isn’t just about placing a name with a face. If you think about how people use the like button, connect to groups, connect to each other, a tagged photo gives additional context. Hackers would love to have this information about you...

Comments  (1)

65be44ae7088566069cc3bef454174a7

Messaging Mishaps Have Collateral Damage

August 21, 2012 Added by:Rebecca Herold

Bottom line for all organizations, from the largest to the smallest: You need to establish messaging policies that clearly communicate that all emails sent through the company email system are subject to monitoring, and that no one using the system should have any expectation of privacy for the messages...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Network Exposure and Healthcare Privacy Breaches

August 20, 2012 Added by:Danny Lieberman

EHR interconnected with HIE systems have a big threat surface, because of big, very complex software systems with a large number of attacker entry points. Healthcare system vulnerabilities are compounded since everyone is using the same technology from Microsoft and following the same HIPAA compliance checklists...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Illinois Bars Employers from Obtaining Social Media Credentials

August 20, 2012 Added by:David Navetta

Although privacy advocates and federal regulators and legislators have primarily been focusing on consumer privacy issues, such as behavioral advertising and data mining, the significant changes in workplace privacy protections demand continued vigilance from employers...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

These Drones are Made for Watchin'

August 19, 2012 Added by:Electronic Frontier Foundation

The public has been pushing back on broad use of drones by law enforcement. At the request of reporters, advocacy organizations and city councils, public agencies have been required to justify their drone purchases and develop clear policies on when and under what conditions they will use drones for surveillance...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

The Day I Was Erased Digitally

August 17, 2012 Added by:Theresa Payton

It’s everyone’s worst night nightmare - everything digital in your life gets wiped out. Your phone, your computer, your tablet, every email address, social network profile. It really does happen, and most of you probably didn’t know that even techies and security experts worry about this happening to them...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Not Providing Education is the Dumbest Idea for Infosec

August 14, 2012 Added by:Rebecca Herold

Every year or so, an otherwise smart information security professional publishes some really bad information security advice about how awareness and training is a waste of time and money. Bottom line for all organizations: Humans have always been and will always be the weakest link in security...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Ask the Experts: Facebook Security for Teenagers

August 14, 2012 Added by:Brent Huston

"Watch the scams and traps that are strewn like land mines throughout the site. Watch the free give-aways, be wary of clicking on pictures and videos and look carefully at any messages that contain links or suggest web sites to visit. Also, be VERY careful about ‘friends’ of friends..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Risks from a Lost or Stolen Mobile Device

August 13, 2012 Added by:Robert Siciliano

Mobile devices are on the move, meaning they can more easily be lost or stolen and their screens and keyboards are easier targets for “over the shoulder” browsing. When we lose our phones, we think about the pain and cost of replacing the device. But that’s just the tip of the iceberg...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Information Exchanges: The Death of Patient Privacy

August 09, 2012 Added by:Danny Lieberman

Health information exchanges (HIE) enable the sharing of health records by physicians and other providers, enabling my family physician to see the results without getting up from her desk or without me shlepping paper or CD. Unfortunately, HIE are being modeled after the retail industry supply-chain model...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »