Legal

7ddc1f3000a13e4dfec28074e9e7b658

Court Orders Megaupload Parties to Come Up with a Plan

April 25, 2012 Added by:Electronic Frontier Foundation

The government, which had originally seized files and still apparently holds all of Megaupload's financial assets, had argued that it had no obligation to make sure the files of innocent Megaupload users were returned and, in fact, believed that they could be destroyed...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

The Security, Privacy and Legal Implications of BYOD

April 24, 2012 Added by:David Navetta

Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable. Unfortunately, BYOD raises significant data security concerns which can lead to potential legal risk...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Opposes CISPA at Hackers and Founders Panel

April 23, 2012 Added by:Electronic Frontier Foundation

The fundamental problems with the bill are numerous. The language of the bill is too broad, and it's hard to know what information will actually be shared by private entities as a result of the bill, or what “cybersecurity systems” will do once they are enabled...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FTC Final Report Provides Meaningful Protection Online

April 21, 2012 Added by:Electronic Frontier Foundation

Recently, the FT) released a final report on digital consumer privacy after more than 450 companies, advocacy groups and individuals commented on the December 2010 draft. The final report creates strong guidelines for protecting consumer privacy choices in the online world...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

CISPA Legislation FAQs: The Disturbing Dangers

April 18, 2012 Added by:Electronic Frontier Foundation

EFF—along with a host of other civil liberties groups—are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

An Enterprise Compliance Dialogue

April 17, 2012 Added by:Thomas Fox

Management must “walk the talk” through both discipline and a system of rewards. The discipline must be clear and delivered decisively. The rewards must be not only direct financial remuneration but also the internal promotion of persons who do business in an ethical manner...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Commission Report on Protecting Consumers

April 16, 2012 Added by:David Navetta

The FTC has a front and center role in data privacy and enforcement. We have written extensively about the FTC’s actions and recommendations. How is the final Framework different from the draft Framework and what should your privacy professionals be taking away from the Framework?

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Data Breach Study Finds Breach Costs Have Fallen

April 13, 2012 Added by:David Navetta

The latest CDBS study can be considered a bookend to Verizon’s annual DBIR. The two reports paint a data breach landscape that continues to change. For the first time in seven years, both the organizational cost of data breach and the cost per lost or stolen record have declined...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Three Keys to the Role of a Chief Compliance Officer

April 11, 2012 Added by:Thomas Fox

There is an ongoing debate in the compliance world about whether a company can or should combine or separate the role of the CCO from that of the General Counsel. Before a company can answer this question, it must meet No. 6 of the DOJ's minimum best practices requirement...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Megaupload Goes to Court: A Primer

April 11, 2012 Added by:Electronic Frontier Foundation

Does the government have a responsibility to protect innocent third parties from collateral damage when it seizes their property in the course of prosecuting alleged copyright infringement? That is the question a federal district court will consider...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

UK Proposes Monitoring Every Email, Call, and Text Message

April 10, 2012 Added by:Electronic Frontier Foundation

Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Campaign Targeting Activists Escalates with New Surveillance Malware

April 08, 2012 Added by:Electronic Frontier Foundation

The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Court to Rehear Electronic Device Border Search Case

April 05, 2012 Added by:Electronic Frontier Foundation

When it comes to the government's ability to search your electronic devices, we've always maintained that the border is not an "anything goes" zone. Recently, the Ninth Circuit Court of Appeals agreed to rehear a case that gave the government carte blanche...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Barbara Tuchman and Compliance Programs

April 04, 2012 Added by:Thomas Fox

Compliance professionals are continually try to get the message out at corporations. Here is some wisdom that Tuchman advocated and how it might help the compliance professional convey the essence of doing business in compliance across a corporation...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC to Link Do-Not-Track and Big Data Concerns

April 02, 2012 Added by:David Navetta

The FTC sees a greater threat to consumers in third-party data collection because of lack of notice, choice and transparency in the practices of data collectors. But the challenge is understanding where to draw the line between “first party” and “third party” practices...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »