Blog Posts Tagged with "Regulation"


FTC to Link Do-Not-Track and Big Data Concerns

April 02, 2012 Added by:David Navetta

The FTC sees a greater threat to consumers in third-party data collection because of lack of notice, choice and transparency in the practices of data collectors. But the challenge is understanding where to draw the line between “first party” and “third party” practices...

Comments  (1)


Cloud Security and the Enterprise

March 29, 2012 Added by:Ben Kepes

We need to ensure that legislation and regulations for cloud services truly reflect the realities of the cloudy world we live in and do not allow for a shotgun approach to compliance that primarily meets the needs of just one powerful interest group...

Comments  (0)


Is a W-2 Considered PHI Under HIPAA?

March 25, 2012 Added by:Rebecca Herold

The question was framed as meaning the entire W-2 form was being “submitted” for financial assistance to pay for healthcare, so with this in mind, we will consider it as one document containing several information items that are necessarily grouped together...

Comments  (0)


Transborder Data Flows at Risk

March 22, 2012 Added by:David Navetta

The proliferation of comprehensive data privacy laws, more or less on the European model, increasingly requires US-based multinationals and online companies to adapt to strict requirements for dealing with individuals in other countries...

Comments  (0)


A Seat at the Table: Compliance in the Contract Tender Process

March 21, 2012 Added by:Thomas Fox

A mature compliance program can be a great benefit for a company, not only in evaluating risk from the compliance perspective but also preparing the necessary steps so that if a contact is awarded, it can be executed in an efficient manner. But it must have a seat at the table...

Comments  (0)


Commerce Secretary Bryson Doesn't Understand Cyber Espionage

March 15, 2012 Added by:Jeffrey Carr

The U.S. will only begin to save its intellectual property from cyber thieves when corporate boards of directors force CEOs to inventory, segregate and monitor their critical data in real time which usually means re-architecting their entire network...

Comments  (0)


NTIA Requests Comments on New Privacy Framework

March 14, 2012 Added by:David Navetta

The NTIA seeks comments to begin development of the consumer data collection code of conduct among a broad spectrum of stakeholders in which companies will voluntarily participate, but which will also be legally enforceable and subject to the jurisdiction of the FTC...

Comments  (8)


Improving Compliance Performance in Your Supply Chain

March 05, 2012 Added by:Thomas Fox

One of the areas moving towards being incorporated into compliance programs is the supply chain. While many companies have focused significant compliance efforts towards the sales chain, the supply chain is now viewed as an area which requires compliance scrutiny...

Comments  (0)


Cross-Border Sovereignty Issues in the Cloud

March 02, 2012 Added by:Rafal Los

It's about due care, process, and not rushing into a cloud computing migration. Take a rational approach and first understand the parameters you need to operate. Then enforce with prejudice those requirements on your vendors and know the way cloud computing is delivered...

Comments  (0)


On President Obama’s Consumer Privacy Bill of Rights

February 29, 2012 Added by:Brian Dean

If new legislation is passed, those who have already embraced the CPBR concepts will be well positioned to comply with it. Also, meeting these objectives will meet your clients’ expectations, including those detailed by the CPBR, creating a competitive advantage...

Comments  (0)


FCC Prompts ISPs to Adopt Code of Conduct Standards

February 24, 2012 Added by:Headlines

"If we fail to tackle these challenges, we will pay the price in the form of diminished safety, lost privacy, lost jobs, and financial vulnerability – billions of dollars potentially lost to digital criminals," FCC Chairman Julius Genachowski said...

Comments  (0)


New EU Data Regulations – What Companies Need to Consider

February 23, 2012 Added by:Fergal Glynn

EU Data Protection Authorities will apply these rules even if this information is processed outside of Europe, it’s not clear today whether these new rules will have an impact on the existing Safe Harbor regulations – something to watch out for in the consultation period...

Comments  (0)


Obama Unveils Blueprint for Online Privacy Bill of Rights

February 23, 2012 Added by:Headlines

The Obama Administration today unveiled a “Consumer Privacy Bill of Rights” as part of a comprehensive blueprint to improve consumers’ privacy protections and ensure that the Internet remains an engine for innovation and economic growth...

Comments  (0)


Cybersecurity Act of 2012 - Cybersecurity Collides with Risk

February 19, 2012 Added by:Rafal Los

This is just a chance to create some new regulatory-agency office, hire a bunch of new auditors, attorneys, experts, and waste more time rather than actually making critical infrastructure more risk-averse...

Comments  (0)


Log Management: Debugging Security

February 18, 2012 Added by:Danny Lieberman

Logs are key to security management not only for understanding what and why an event happened but also in order to prove regulatory compliance. The business requirements are that security logs should be both relevant and effective...

Comments  (0)


We Have Every Right to be Furious about ACTA

February 13, 2012 Added by:Electronic Frontier Foundation

While ACTA was only negotiated between a few countries, it has global consequences. First because it will create new rules for the Internet, and second because its standards will be applied to other countries through the U.S.’s annual Special 301 process...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked