Posts Tagged ‘IT compliance’

At the Secure 360 Conference

Monday, May 12th, 2008

Tomorrow and Wednesday I’m doing some sessions at the Secure 360 conference in St. Paul, Minnesota. I’m really looking forward to also seeing the other sessions while here (yes, I’ve arrived and getting some work done in my room)!

(more…)

Happy Mother’s Day!

Sunday, May 11th, 2008

Happy Mother’s Day! It was a gorgeous day here in central Iowa! I did business work all morning, but then took off at 3:00pm, went out with my family to a restaurant we all love, and then did some gardening; tomatoes, turnips, watermelon, peppers, pumpkins, sunflowers and sweet corn this year…plus a few pretty assorted annuals! The fruit trees, red buds, crab apple trees, Russian olives, and wigelias are all in full bloom right now…and the scent of the breeze is spectacular! 🙂
In honor of Mother’s Day I quickly scanned the news and blog sites to see what types of interesting information I could find relating to mother’s day and privacy. I didn’t find much, but here is a bit of what I found…

(more…)

A Couple Of Little Known HIPAA Facts

Thursday, May 8th, 2008

Last week I was contacted by Corey Goodman, a reporter for HCPro, about a story he is doing that sounds like it will be quite interesting! He is collecting examples and anecdotes about “little know HIPAA facts” and asked me to contribute some for his article.
I anticipate that he will be cutting the couple of little known facts I provided to him down quite a bit, so I wanted to provide them here not only as a future reference for myself, but also for those of you who may be interested!

(more…)

Another Example Of How Internet Information Impacts Employment Decisions

Wednesday, May 7th, 2008

I’ve blogged several times about how employers are inreasingly using information found on the Internet to make hiring, and firing, decisions, such as here and here.
I’ve also written about it several times, such as here.
Here’s another example to add to your files for how information posted to social networking sites, such as MySpace and Facebook, can impact your employment situation where a woman graduating with an education degree was denied teaching credentials, and this is not the first time a situation has occurred similar to this…

(more…)

Revisiting Two Viewpoints Of Outsourcing Vendor Security

Tuesday, May 6th, 2008

While at CSI SX last week, we covered the need to ensure business partners, to whom we outsource information processing and handling, have good security and privacy programs in place within the class I provide with Chris Grillo, “Executive Summit: Security and Privacy Collaboration.”

(more…)

Click Wrap Contracts: Creating Them And Agreeing To Them

Monday, May 5th, 2008

There was an interesting article in this week’s issue of Privacy and Security Law, “Clickwrap Notifying Software Recipients Of Pop-Up Installation Is Valid, Enforceable” (a subscription site).

(more…)

What Business Leaders Need To Know About Employee Privacy

Sunday, May 4th, 2008

Here it is May, and I’m just now getting all of my April IT Compliance in Realtime Journal articles blogged about! Being in Las Vegas for a week at CSI SX / Interop really put a monkey wrench in my blogging activity last week.
While at the conference I spoke with many information security and IT leaders about privacy. Most have customer privacy on their minds, but a significant portion have not thought about employee privacy issues.
So, this article, “What Business Leaders Need To Know About Employee Privacy,” which is the third in my April IT Compliance in Realtime Journal issue, is pretty timely.
Download the April issue to get a much prettier, formatted version. Here is the unformatted article…

(more…)

Using DNA Of Family Members To Catch Criminals

Thursday, May 1st, 2008

I just read an interesting article, “Using kin’s DNA to track suspects.”

(more…)

Corporate Communications Officers Tying The Hands Of Information Security and Privacy Pros

Tuesday, April 29th, 2008

I’ve been here at the CSI SX conference for the past few days, and I’ve had the great opportunity and pleasure of speaking with a large number of folks while here. I was finally able to meet Ron Woerner in person (nice to meet you Ron!) after communicating with him in the Security Catalyst Community over the past 1+ year.
I love coming to these conferences and just talking with the participants. There is always at least one topic for which I receive enlightenment that I had not considered before. During the past few days I’ve spoken with 4 to 5 people who are responsible for information security, all from highly regulated industries, who all say despite their adequate to even generous information security and privacy budgets, some of their most important information security and privacy efforts are being quashed by their corporate communications offices; those responsible for the messages that are sent to personnel throughout the enterprise.

(more…)

P2P Security Study Released

Monday, April 28th, 2008

The results of an interesting study, “The Ignored Crisis in Data Security: P2P File Sharing,” performed by the Ponoman Institute and sponsored by Tiversa, were recently released on April 21.
Here are a few interesting tidbits from the report…

(more…)