Posts Tagged ‘IT compliance’

$243 Million Judgment In Iowa For Violations Of Spam Law

Sunday, October 19th, 2008

Here’s something interesting I just ran across…

(more…)

Federal Reserve Releases Examination Procedures For Red Flags Rule Compliance

Friday, October 17th, 2008

If you must comply with the Red Flags Rule, which is a rule that falls under the umbrella of the Fair and Accurate Credit Transactions Act (FACTA), which most organizations in the U.S. who process payments from their customers must comply with, for which compliance is required by November 1 of this year, then you should review the recently released guidance documents that will be used by the government oversight examiners…

(more…)

Two Great Sites About Privacy Breaches and Privacy Studies

Thursday, October 16th, 2008

A friend (thanks Terry!) just pointed me to a couple of really great sites that Nymity provides without needing to register, and they have no ads or marketing…

(more…)

Insider Threat Example: Obama’s Campaign Folks Make Email Mistake

Wednesday, October 15th, 2008

No matter how much technology you throw at trying to prevent security incidents, the weakest link in the organization, your personnel (who could be your strongest link with effective training and ongoing awareness) can defeat that security technology.
On purpose, because of lack of knowledge, or by making a plain ol’ mistake.
And EVERYONE makes mistakes. Fewer if they are more diligently aware though.

(more…)

Commerce Department Issues New Rule For Encryption Exports

Tuesday, October 14th, 2008

Remember all the talk in the 1990’s that surrounded the legalities, and largely restrictions, surrounding how encryption could be used for data sent outside the U.S.? Or how encryption tools and algorithms could be exported? It’s been a significantly more silent issue during this new century.

(more…)

Identity Theft Enforcement and Restitution Act of 2008

Sunday, October 12th, 2008

I just read about a new law signed at the end of September, 2008, by U.S. President Bush, H.R. 5983; the “Identity Theft Enforcement and Restitution Act of 2008” which is under Title II.

(more…)

Info Security & Privacy Convergence in Michigan!

Friday, October 10th, 2008

I just realized that I have not yet posted about providing our “Information Security and Privacy Convergence and Collaboration” 2-day training class that I’ll be co-teaching with Chris Grillo in Grand Rapids, MI on Wednesday, November 12, 2008 AND Thursday, November 13, 2008 See more about it here.

(more…)

More Need Than Ever For Information Security In A Bad Economy!

Thursday, October 9th, 2008

There is no doubt that this economy is impacting all companies and most individuals. I’ve read about and heard from many organizations that, as a result, their information security and privacy budgets are being drastically reduced, or even cut completely, in an attempt to save money during these uncertain times.
Throwing out the baby with the bath water in this way is a very bad idea!

(more…)

Palin Email Hacker Indicted

Wednesday, October 8th, 2008

Around September 10 a widely-reported story broke about how Sarah Palin’s Yahoo! email account was broken into.
Contents of some of her email messages were then widely posted to various Internet websites.

(more…)

HIPAA Compliance During Emergencies and Disasters

Tuesday, October 7th, 2008

Yesterday the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) posted a new HIPAA frequently asked question (FAQ) to their site; a great question that many organizations do not even consider until after the fact…

(more…)