Archive for the ‘Privacy and Compliance’ Category

Crooks Don’t Need to Steal SSNs If They Can Create Valid SSNs Themselves

Friday, July 10th, 2009

I’ve had some very interesting discussions about the CMU SSN study throughout the week, and, before moving on to other topics next week, I wanted to wrap up the week and discussion with some final thoughts on the CMU SSN topic..

(more…)

Implications Of The CMU SSN Study: What Business Leaders Need To Understand

Wednesday, July 8th, 2009

Following the release of the CMU SNN report on Monday, I’ve had some very interesting discussions with privacy and information security folks, and I’ve been pretty amazed at some of the reactions to the study.
I also posted about this to one of the GRC mailing lists I participate in, and I got some questions asking me for my thoughts about some specific issues. I wanted to share those thoughts here as well…

(more…)

Study Proves SSNs Are Easily Guessed; Don’t Use SSNs To Verify Identity Or As Passwords!

Monday, July 6th, 2009

It is nice to have scientific evidence of what we’ve been telling business leaders ever since they wanted to start using SSNs as identifiers and passwords!
Today Carnegie Mellon University (CMU) released a very revealing report, “Predicting Social Security numbers from public data” I want to expand upon some of the issues covered within it, and then urge you to communicate effectively to your business leaders the related concerns of your organization…

(more…)

Study Proves SSNs Are Easily Guessed; Don’t Use SSNs To Verify Identity Or As Passwords!

Monday, July 6th, 2009

It is nice to have scientific evidence of what we’ve been telling business leaders ever since they wanted to start using SSNs as identifiers and passwords!
Today Carnegie Mellon University (CMU) released a very revealing report, “Predicting Social Security numbers from public data” I want to expand upon some of the issues covered within it, and then urge you to communicate effectively to your business leaders the related concerns of your organization…

(more…)

Nevada’s New Encryption Law; Made Moot By Its Own Data Breach Law?

Thursday, July 2nd, 2009

On May 30, 2009, Nevada enacted a new law, SB 227, which will basically replace NRS 597.970 in January 2010.
In many ways the new law is an improvement over the much more vague, and brief, NRS 597.970. I want to focus here on an improvement, but something that still leaves much to interpretation; that is, what is meant by “encryption”?

(more…)

Hear Common, Dumb and Dangerous Privacy Assumptions On The Radio!

Tuesday, June 30th, 2009

Today I will be on MyTechnologyLawyer.com radio show to an hour program talking about the common privacy mistakes and assumptions made by businesses. This will be a more in-depth look at the issues from my post from a couple of weeks ago, “5 Common, Dumb and Dangerous Privacy Assumptions
Here are the details:

(more…)

Hear Common, Dumb and Dangerous Privacy Assumptions On The Radio!

Tuesday, June 30th, 2009

Today I will be on MyTechnologyLawyer.com radio show to an hour program talking about the common privacy mistakes and assumptions made by businesses. This will be a more in-depth look at the issues from my post from a couple of weeks ago, “5 Common, Dumb and Dangerous Privacy Assumptions
Here are the details:

(more…)

South Carolina & Alaska Privacy Breach Notice Laws Go Into Effect July 1

Monday, June 29th, 2009

This week two more U.S. breach notice laws go into effect…

(more…)

Don’t Manage Employee Online Activities By Requiring Their IDs & Passwords!

Thursday, June 18th, 2009

I read a story about a city government agency actually asking job applicants to provide their IDs and passwords for any online social networking type of site they participate in…

(more…)

5 Common, Dumb and Dangerous Privacy Assumptions

Wednesday, June 17th, 2009

Today Kevin Beaver posted a nice article, “Dumb things IT consultants do” that included more than one warning about making assumptions. Kevin’s nice post made me think about all the dangerous assumptions consulants and practitioners often make when it comes to evaluating privacy practices…

(more…)