February 13th, 2008
I knew the civil suits for lost laptops would start soon. Thanks so much to my buddy Alec for pointing out this story to me!
Raelyn Campbell took a laptop computer to Best Buy to get fixed, and three months later, after giving Campbell the run-around, Best Buy admitted to her that they lost the computer.
Read the rest of this entry »
Tags: awareness and training, Best Buy, Information Security, IT compliance, lost laptop, personal privacy, personally identifiable information, PII, policies and procedures, privacy, privacy policy, Raelyn Campbell, risk management, security awareness, security training
Posted in Privacy Incidents | 1 Comment »
February 12th, 2008
I just saw a term that can be used really well with non-technical folks, “data pollution.”
I wish I had thought of that term!
Read the rest of this entry »
Tags: awareness and training, data pollution, Information Security, IT compliance, personally identifiable information, PII, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Privacy Incidents | No Comments »
February 12th, 2008
This is a sad example of how others take it upon themselves to invade the privacy of others and don’t understand that they’re doing anything wrong…
Read the rest of this entry »
Tags: awareness and training, Information Security, IT compliance, Paula Abdul, personal privacy, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, social networking
Posted in Privacy and Compliance, Privacy Incidents | No Comments »
February 11th, 2008
Here are two more insider threat incident examples to put into your files and use within your information security and privacy training curriculum and awareness communications:
Read the rest of this entry »
Tags: awareness and training, CNN, Department of Defense, Dongfan Chung, Gregg William Bergersen, Information Security, insider threat, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security | No Comments »
February 11th, 2008
Hopefully most people know by now that whatever you post on the Internet is not private, and that basically anyone can read it. Hopefully most people know by now that it is a growing trend for employers to use information they find on the Internet in their hiring and firing decisions.
Well, it appears the information found on the Internet can now be used by insurers to make decisions about to whom they will and will not provide insurance.
Read the rest of this entry »
Tags: awareness and training, Beye, Blue Cross Blue Shield, HIPAA, Horizon, Information Security, IT compliance, patient privacy, policies and procedures, privacy, privacy policy, risk management, security awareness, security law, security training
Posted in Privacy and Compliance | No Comments »
February 9th, 2008
Tags: awareness and training, cyber crime, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, Saudi Arabia, security awareness, security law, security training
Posted in Laws & Regulations | 1 Comment »
February 8th, 2008
Here’s an interesting juxtaposition of hacker-related news articles…
When scanning today’s news I saw the headline, “Teen Is World’s Youngest ‘Ethical Hacker’”
Read the rest of this entry »
Tags: awareness and training, ethical hacker, hacker, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, Shane Kelly
Posted in Information Security, Training & awareness | No Comments »
February 7th, 2008
Here’s a good article for all information security and privacy pros to read and show their business leaders. If nothing else show them the last paragraph:
Read the rest of this entry »
Tags: awareness and training, Dark Reading, Information Security, IT compliance, Peter Tippett, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security, Privacy and Compliance, Training & awareness | No Comments »
February 7th, 2008
Here’s one more thing for IT, Information Security and Privacy folks to put on their list of things to worry about…
Read the rest of this entry »
Tags: awareness and training, Google Apps, Information Security, IT compliance, personally identifiable information, PII, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security | No Comments »
February 6th, 2008
I got a nice message from Brian Honan yesterday letting me know that February 12 is “Safer Internet Day,” or SID for short; (Thanks Brian!)
Read the rest of this entry »
Tags: Athens-Chilesburg Elementary School, awareness and training, Brian Honan, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, Safer Internet Day, security awareness, security training, SID
Posted in Training & awareness | No Comments »