Posts Tagged ‘Information Security’

FTC Applies GLBA & FTC Act Sanctions To Mortgage Lender

Monday, November 10th, 2008

I anticipate that with the big $700 billion “rescue” plan the government is going to continue the increased compliance activities…

(more…)

Cybercriminals Threaten To Post Millions Of PII Records For Express Scripts Customers

Friday, November 7th, 2008

Just last month I blogged about the new Identity Theft Enforcement and Restitution Act of 2008. It covers extortion. I’m interested to see if it gets used for the latest extortion attempt…

(more…)

State of New York Issues Guide For Protecting PII

Thursday, November 6th, 2008

The State of New York just released a general guide to the protection of personally identifiable information (PII)…

(more…)

Email “Hack” Tells University Students & Staff That U.S. President Vote Is “Tomorrow”

Wednesday, November 5th, 2008

Here’s another email incident example to add to your files…

(more…)

New Examiner Instructions From The OTS For Red Flags Rule Enforcement

Monday, November 3rd, 2008

Organizations that are covered by regulations will do themselves a free compliance favor by reading…and knowing…what the examiners will be looking for when they visit to do their compliance audits.

(more…)

Use Case Studies To Make Learning More Effective

Friday, October 31st, 2008

I’m in the process of updating the case studies for the 2-day class I’m giving…TWICE…in the next few weeks, “Information Security and Privacy Convergence and Collaboration.”
First in Grand Rapids, Michigan, hosted by the Michigan InfraGard and the West Michigan Chapter of ISACA on November 12 and 13.
Second immediately following the CSI Annual conference in National Harbor, MD (just south of D.C.) on November 20 and 21…

(more…)

Use Case Studies To Make Learning More Effective

Friday, October 31st, 2008

I’m in the process of updating the case studies for the 2-day class I’m giving…TWICE…in the next few weeks, “Information Security and Privacy Convergence and Collaboration.”
First in Grand Rapids, Michigan, hosted by the Michigan InfraGard and the West Michigan Chapter of ISACA on November 12 and 13.
Second immediately following the CSI Annual conference in National Harbor, MD (just south of D.C.) on November 20 and 21…

(more…)

Use Case Studies To Make Learning More Effective

Friday, October 31st, 2008

I’m in the process of updating the case studies for the 2-day class I’m giving…TWICE…in the next few weeks, “Information Security and Privacy Convergence and Collaboration.”
First in Grand Rapids, Michigan, hosted by the Michigan InfraGard and the West Michigan Chapter of ISACA on November 12 and 13.
Second immediately following the CSI Annual conference in National Harbor, MD (just south of D.C.) on November 20 and 21…

(more…)

Audit Shows That After 5 Years CMS *STILL* Has No Documented Procedures For Ensuring HIPAA compliance

Thursday, October 30th, 2008

This week the Department of Health and Human Services (HHS) Office of Inspector General (OIG) released a very interesting assessment of how well, and how effectively, the Centers for Medicare & Medicaid Services (CMS) was performing their Health Insurance Portability and Accountability Act (HIPAA) oversight responsibilities.

(more…)

Audit Shows That After 5 Years CMS *STILL* Has No Documented Procedures For Ensuring HIPAA compliance

Thursday, October 30th, 2008

This week the Department of Health and Human Services (HHS) Office of Inspector General (OIG) released a very interesting assessment of how well, and how effectively, the Centers for Medicare & Medicaid Services (CMS) was performing their Health Insurance Portability and Accountability Act (HIPAA) oversight responsibilities.

(more…)