Vote! Vote! Vote!

November 4th, 2008

Today, at long last, the marathon of a presidential election race is finally almost over. Today…finally…the finally final votes are made for U.S. president. Did I mention finally? The race has been going on for two years here in Iowa.
I voted absentee ballot around 3 – 4 weeks ago; I’m so glad I don’t need to deal with the long lines. But it is *GOOD* for once to see those long lines! More people need to get involved with voting.
Here are a few interesting headlines about voting related (directly or indirectly) with security and/or privacy…

Read the rest of this entry »

New Examiner Instructions From The OTS For Red Flags Rule Enforcement

November 3rd, 2008

Organizations that are covered by regulations will do themselves a free compliance favor by reading…and knowing…what the examiners will be looking for when they visit to do their compliance audits.

Read the rest of this entry »

Use Case Studies To Make Learning More Effective

October 31st, 2008

I’m in the process of updating the case studies for the 2-day class I’m giving…TWICE…in the next few weeks, “Information Security and Privacy Convergence and Collaboration.”
First in Grand Rapids, Michigan, hosted by the Michigan InfraGard and the West Michigan Chapter of ISACA on November 12 and 13.
Second immediately following the CSI Annual conference in National Harbor, MD (just south of D.C.) on November 20 and 21…

Read the rest of this entry »

Use Case Studies To Make Learning More Effective

October 31st, 2008

I’m in the process of updating the case studies for the 2-day class I’m giving…TWICE…in the next few weeks, “Information Security and Privacy Convergence and Collaboration.”
First in Grand Rapids, Michigan, hosted by the Michigan InfraGard and the West Michigan Chapter of ISACA on November 12 and 13.
Second immediately following the CSI Annual conference in National Harbor, MD (just south of D.C.) on November 20 and 21…

Read the rest of this entry »

Use Case Studies To Make Learning More Effective

October 31st, 2008

I’m in the process of updating the case studies for the 2-day class I’m giving…TWICE…in the next few weeks, “Information Security and Privacy Convergence and Collaboration.”
First in Grand Rapids, Michigan, hosted by the Michigan InfraGard and the West Michigan Chapter of ISACA on November 12 and 13.
Second immediately following the CSI Annual conference in National Harbor, MD (just south of D.C.) on November 20 and 21…

Read the rest of this entry »

Audit Shows That After 5 Years CMS *STILL* Has No Documented Procedures For Ensuring HIPAA compliance

October 30th, 2008

This week the Department of Health and Human Services (HHS) Office of Inspector General (OIG) released a very interesting assessment of how well, and how effectively, the Centers for Medicare & Medicaid Services (CMS) was performing their Health Insurance Portability and Accountability Act (HIPAA) oversight responsibilities.

Read the rest of this entry »

Audit Shows That After 5 Years CMS *STILL* Has No Documented Procedures For Ensuring HIPAA compliance

October 30th, 2008

This week the Department of Health and Human Services (HHS) Office of Inspector General (OIG) released a very interesting assessment of how well, and how effectively, the Centers for Medicare & Medicaid Services (CMS) was performing their Health Insurance Portability and Accountability Act (HIPAA) oversight responsibilities.

Read the rest of this entry »

Create A Clear Education Strategy BEFORE Asking Executives for Training and Awareness Support

October 29th, 2008

Information security, privacy, and compliance practitioners must obtain the support of executive management to be successful. So how do you do this?
I talk about this in the first section of the first article of my October issue of “IT Compliance in Realtime Journal.”
Here is the unformatted version of the first section of the first article; download the PDF to see a much nicer-looking version…

Read the rest of this entry »

The Insider Threat For Identity Theft: Watchout For Dead-Beat Parents

October 28th, 2008

Here’s a story that points to how vulnerable people are to identity theft and other types of crimes and frauds from slimy family…and ex-family…members…

Read the rest of this entry »

Obama’s and McCain’s Data Protection Plans

October 27th, 2008

Something that I want to know about the U.S. presidential candidates, along with all their views and plans for the economy, education, healthcare, defense and so on, is what their plans are for information security and privacy protections. The past 8 years certainly has been a mixed bag of impacts for privacy and information safeguards.

Read the rest of this entry »