Posts Tagged ‘policies and procedures’

HIPAA & 4 Lessons From an Insider Threat Example: Former Healthcare IT Manager Hacks Into System and Deletes PHI

Monday, September 10th, 2007

There are so many ways in which bad things can happen with the authorized access personnel and business partners have to sensitive data, personally identifiable information (PII), and business systems. Many times the bad things that happen are a result of a lack of awareness of how to properly protect information, a result of mistakes, or a result of malicious intent. Here is just one more example to add to your file of actual insider threat incidents.

(more…)

HIPAA & 4 Lessons From an Insider Threat Example: Former Healthcare IT Manager Hacks Into System and Deletes PHI

Monday, September 10th, 2007

There are so many ways in which bad things can happen with the authorized access personnel and business partners have to sensitive data, personally identifiable information (PII), and business systems. Many times the bad things that happen are a result of a lack of awareness of how to properly protect information, a result of mistakes, or a result of malicious intent. Here is just one more example to add to your file of actual insider threat incidents.

(more…)

Craig’s Voicemail Error Not Uncommon; Be Sure Your Employees Don’t Do the Same!

Saturday, September 8th, 2007

This week Larry Craig, the U.S. Senator embroiled in a sex scandal, left a long, detailed voice mail message for his lawyer. Problem was, he misdialed and left the message on another person’s voice mail!

(more…)

Craig’s Voicemail Error Not Uncommon; Be Sure Your Employees Don’t Do the Same!

Saturday, September 8th, 2007

This week Larry Craig, the U.S. Senator embroiled in a sex scandal, left a long, detailed voice mail message for his lawyer. Problem was, he misdialed and left the message on another person’s voice mail!

(more…)

Your Name May Be Falling Off the Do Not Call List Soon!

Thursday, September 6th, 2007

I recently did a privacy impact assessment (PIA) for a marketing company and remembered that the U.S. Do Not Call list entries expire after 5 years! Most people do not realize this…did you know this?

(more…)

Breach Notice Laws; Definitely A 21st Century Privacy Issue!

Wednesday, September 5th, 2007

Hey, this week is Global Security Week!
The theme this year is “Privacy in the 21st Century.” Have you sent any communications about this topic out to your personnel?

(more…)

Thinking About Web Bugs…

Monday, September 3rd, 2007

Last week I participated in an interesting discussion on the Security Catalyst site about using web bugs within an organization. I pointed Cutaway to a paper I wrote a couple of years ago, “Quit Bugging Me!”

(more…)

Judge Finds Officers Not Accountable for SOX Report Errors

Saturday, September 1st, 2007

On August 21, 2007, there was a significant court decision made possibly impacting future Sarbanes-Oxley Act decisions in “CENTRAL LABORERS‚Äô PENSION FUND v.INTEGRATED ELECTRICAL SERVICES INC; HERBERT ALLEN; WILLIAM W REYNOLDS; JEFFREY PUGH

(more…)

Jailtime: for Teen Who Posted Nude Photo of His Ex-Girlfriend on MySpace & for Employee Caught with Illegal Porn

Friday, August 31st, 2007

I’ve talked several times about some of the risks of using the social networking sites, such as here and here.
Here is an example of how others can post information about you on these sites that will continue to haunt you for years to come.

(more…)

Can Japan, U.S. and/or Europe Replace Internet And Thus Solve Security Woes?

Thursday, August 30th, 2007

And another very interesting USA Today article, “Japan will research Net replacement.”

(more…)