April 25, 2012 Added by:Electronic Frontier Foundation
The government, which had originally seized files and still apparently holds all of Megaupload's financial assets, had argued that it had no obligation to make sure the files of innocent Megaupload users were returned and, in fact, believed that they could be destroyed...
April 24, 2012 Added by:David Navetta
Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable. Unfortunately, BYOD raises significant data security concerns which can lead to potential legal risk...
April 23, 2012 Added by:Electronic Frontier Foundation
The fundamental problems with the bill are numerous. The language of the bill is too broad, and it's hard to know what information will actually be shared by private entities as a result of the bill, or what “cybersecurity systems” will do once they are enabled...
April 21, 2012 Added by:Electronic Frontier Foundation
Recently, the FT) released a final report on digital consumer privacy after more than 450 companies, advocacy groups and individuals commented on the December 2010 draft. The final report creates strong guidelines for protecting consumer privacy choices in the online world...
April 19, 2012 Added by:Electronic Frontier Foundation
Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...
April 18, 2012 Added by:Electronic Frontier Foundation
EFF—along with a host of other civil liberties groups—are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting...
April 17, 2012 Added by:Thomas Fox
Management must “walk the talk” through both discipline and a system of rewards. The discipline must be clear and delivered decisively. The rewards must be not only direct financial remuneration but also the internal promotion of persons who do business in an ethical manner...
April 16, 2012 Added by:David Navetta
The FTC has a front and center role in data privacy and enforcement. We have written extensively about the FTC’s actions and recommendations. How is the final Framework different from the draft Framework and what should your privacy professionals be taking away from the Framework?
April 13, 2012 Added by:David Navetta
The latest CDBS study can be considered a bookend to Verizon’s annual DBIR. The two reports paint a data breach landscape that continues to change. For the first time in seven years, both the organizational cost of data breach and the cost per lost or stolen record have declined...
April 11, 2012 Added by:Thomas Fox
There is an ongoing debate in the compliance world about whether a company can or should combine or separate the role of the CCO from that of the General Counsel. Before a company can answer this question, it must meet No. 6 of the DOJ's minimum best practices requirement...
April 11, 2012 Added by:Electronic Frontier Foundation
Does the government have a responsibility to protect innocent third parties from collateral damage when it seizes their property in the course of prosecuting alleged copyright infringement? That is the question a federal district court will consider...
April 10, 2012 Added by:Electronic Frontier Foundation
Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...
April 08, 2012 Added by:Electronic Frontier Foundation
The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...
April 05, 2012 Added by:Electronic Frontier Foundation
When it comes to the government's ability to search your electronic devices, we've always maintained that the border is not an "anything goes" zone. Recently, the Ninth Circuit Court of Appeals agreed to rehear a case that gave the government carte blanche...
April 04, 2012 Added by:Thomas Fox
Compliance professionals are continually try to get the message out at corporations. Here is some wisdom that Tuchman advocated and how it might help the compliance professional convey the essence of doing business in compliance across a corporation...
April 02, 2012 Added by:David Navetta
The FTC sees a greater threat to consumers in third-party data collection because of lack of notice, choice and transparency in the practices of data collectors. But the challenge is understanding where to draw the line between “first party” and “third party” practices...
New Legislation on Threat Intelligence Shari... ut ut on 01-28-2015
Cyber-Civic Responsibility... Anoop birha on 01-28-2015
Dark Technology: Are You (Unknowingly) Putti... Anoop birha on 01-28-2015