Today the FTC released their report, “Second Interim Report of the Federal Trade Commission to Congress Under Section 319 of the Fair and Accurate Credit Transactions Act of 2006.”
Before I comment on the report, as an interesting aside, one of the authors of the report, Chairman Deborah Platt Majoras, was named of of 2006’s “Top 5 Influential IT Security Thinkers” in the December 2006 issue of SC Magazine, but I don’t see this issue on their site yet.
Posts Tagged ‘Information Security’
FTC Report on FACTA Effectiveness: Highlights the Need for Better Data Accuracy Practices
Tuesday, December 5th, 2006Oracle Releases New Application Data Safeguard Standards
Monday, December 4th, 2006On 11/28 Oracle released new technology standards for safeguarding data throughout the applications data flow called the Identity Governance Framework (IGF). CNET news reported on it November 30. The article points out that such standards would help prevent data leaks and also contribute to regulatory compliance.
Security OOPS! PII For School Employees Accidentally Mailed by School’s Contractor
Friday, December 1st, 2006On November 27 the Chicago Tribune reported:
“A printing contractor for the Chicago Public Schools said Sunday that it mistakenly mailed a list of names, Social Security numbers and home addresses of nearly 1,740 former school employees as part of a packet of health-insurance information to them.”
Oops! Another privacy breach resulting from a combination of human error and actions by an outsourced vendor.
The Impact of the New False Claims Act Guidelines on HIPAA Compliance
Wednesday, November 29th, 2006DOT Stolen Laptop: Arrest Made
Monday, November 27th, 2006The U.S. Department of Transportation (DOT) laptop stolen in July containing information “such as names, addresses, social security numbers, and dates of bith‚Äîon more than 130,000 individuals who were issued driver’s and pilot licenses in the Tampa and Miami areas” is still missing, but an arrest has been made.
Establish Effective Procedures for Removing Systems Access: Example
Tuesday, November 21st, 2006An article from last Wednesday (11/15) just caught my eye; it is intriguing: “Hoffacker charged with hacking system.” The article indicates a former VP of Technology at Source Media, Stevan Hoffacker, was
“charged with hacking into the company’s computer system three years after he was dismissed, and tipping off employees whose jobs were in jeopardy.”
Support for Information Assurance Activities: Details of FTC Rulings Since 1969 Now Available
Monday, November 20th, 2006I am excited. I’m really happy to see that the U.S. Federal Trade Commission (FTC) has now made available all the minute details about all their rulings since 1969 in one easy (comparatively) to find location.
Why is this so neat, you ask?