Identity Theft Enforcement and Restitution Act of 2008

October 12th, 2008

I just read about a new law signed at the end of September, 2008, by U.S. President Bush, H.R. 5983; the “Identity Theft Enforcement and Restitution Act of 2008” which is under Title II.

Read the rest of this entry »

Info Security & Privacy Convergence in Michigan!

October 10th, 2008

I just realized that I have not yet posted about providing our “Information Security and Privacy Convergence and Collaboration” 2-day training class that I’ll be co-teaching with Chris Grillo in Grand Rapids, MI on Wednesday, November 12, 2008 AND Thursday, November 13, 2008 See more about it here.

Read the rest of this entry »

More Need Than Ever For Information Security In A Bad Economy!

October 9th, 2008

There is no doubt that this economy is impacting all companies and most individuals. I’ve read about and heard from many organizations that, as a result, their information security and privacy budgets are being drastically reduced, or even cut completely, in an attempt to save money during these uncertain times.
Throwing out the baby with the bath water in this way is a very bad idea!

Read the rest of this entry »

Palin Email Hacker Indicted

October 8th, 2008

Around September 10 a widely-reported story broke about how Sarah Palin’s Yahoo! email account was broken into.
Contents of some of her email messages were then widely posted to various Internet websites.

Read the rest of this entry »

HIPAA Compliance During Emergencies and Disasters

October 7th, 2008

Yesterday the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) posted a new HIPAA frequently asked question (FAQ) to their site; a great question that many organizations do not even consider until after the fact…

Read the rest of this entry »

Information Security and Privacy Convergence and Collaboration

October 6th, 2008

Effectively addressing and coordinating privacy and information security initiatives has moved to the top of the list for companies maintaining customer and employee information. However, there are often gaps in communication and collaboration between Privacy and Information Security activities.
These gaps create more complexity and bigger challenges for companies to handle, as well as putting the organization at greater risk for incidents, along with contractual and regulatory noncompliance.

Read the rest of this entry »

Do Your Legal Contracts Conflict with Your Web Site Privacy Policy?

October 3rd, 2008

Over the years I’ve found while doing website privacy policy reviews and gap analyses that a large portion of organizations make promises within their posted web site privacy policies that they do not support by internal procedures, and that they do not provide internal personnel training and awareness communications for; a huge risk!
I’ve also found that many organizations have online contracts for their web site customers that are in conflict with their posted privacy policies.

Read the rest of this entry »

Are the Terms of Your Legal Contracts Enforceable?

October 1st, 2008

Most web sites have some type of legal contract that is presented to site visitors for any number of reasons. Do your web site visitors actually read them? It probably depends upon how the contracts are presented to the web site visitors, and how the wording is constructed.
Are the contracts written clearly? Or, could they be interpreted in multiple ways? Or trick people into thinking they are agreeing to something other than what the legalese is trying to obligate them to agree to?

Read the rest of this entry »

Do Your Legal Contracts Trick Web Site Visitors into Installing Spyware?

September 30th, 2008

Over the past few years I’ve done a lot of research and reviewed a lot of privacy policies, and it’s really been amazing to see how the wording in many of them are not providing any privacy protections to website visitors or customers at all! In fact, some of them are downright tricking people into agreeing to share their personally identifiable information (PII) having software installed on their computers that they probably really do not want to have…

Read the rest of this entry »

PII Encryption Required by New Massachusetts and Nevada Laws

September 29th, 2008

There is a growing trend in laws that require personally identifiable information (PII) to be encrypted.
Encryption in past laws have been directed to be considered based upon risk, but now they are more explicitly required in some laws.

Read the rest of this entry »