Monday I talked about France’s 2006/2007 CNIL privacy report. The United Kingdom (UK) also recently released their 2006/2007 data protection report.
Posts Tagged ‘policies and procedures’
UK Annual Privacy Report: Businesses Need To Give Individuals Access to Their PII, and More Awareness and Training Is Needed
Wednesday, July 18th, 2007An Exemplary Privacy Practice at a University
Tuesday, July 17th, 2007There are many…*MANY*…reports of privacy breaches and security incidents virtually every day. However, I think it is important to point out when organizations do something right with regard to privacy practices, particularly when they are uncommon compared to what other businesses do; perhaps other organizations will see their positive example and follow their lead.
Data Protection & Privacy Noncompliance Fines Increasing in France
Monday, July 16th, 2007The French Data Protection Authority (CNIL) made some interesting statements last week in their annual report, covering June 2006 through June 2007, about some fines they’ve given during the past 12 months for non-compliance with their data protection laws.
HIPAA Violation in Divorce Proceeding?
Friday, July 13th, 2007Privacy: Are You Sure You *REALLY* Have Nothing To Hide?
Thursday, July 12th, 2007During the past few years it has become more common to have phone records, purchase records, and other logged activities datamined and reviewed by various organizations, government agencies and law enforcement groups. One highly publicized example was when AT&T provided access to their customers’ phone records and Internet communications to the U.S. National Security Agency (NSA).
Carnegie Mellon’s Data Privacy Head Urges Development of New Privacy Technologies
Wednesday, July 11th, 2007I enjoy reading Scientific American Magazine. And I especially am interested in reading their articles that touch upon, or directly address, information security, privacy or compliance. It is always nice to see the views of practitioners, educators, researchers and others who are not on the typical information security circuit of publications.
Trademarks, Virtual Reality Sites, and Creating a Very Aware Next Generation of Information Assurance Leaders
Tuesday, July 3rd, 2007I’ve been working in my home office for around 7 1/2 years, being able to do most of my project work from home, which I’m thankful for. During that time my now 10-year-old and 7-year-old (he’ll remind you he turns 8 next month) sons have been around me quite a bit as I do my work. So I discuss a lot of what I do with them, they ask a lot of questions, and they soak a whole lot more into their brains than I realize. Especially over summer when they are at home with me virtually all day every day.
5 Security Lessons from Non-Compliance with UK Data Protection Law
Monday, July 2nd, 2007I speak with many organizations who have customers throughout the world, often via their ecommerce websites, and an alarmingly large number of these organizations are completely unaware of the data protection laws they must follow in the countries where their customers are from. When the privacy commissioners from these other countries discover the organizations not following the laws, the organizations can have substantial financial impact on their businesses from not only fines, but typically more significantly from bad press, and orders to discontinue business within the country until they have their business activities, policies and processes in compliance with the requirements.
RAM Is Subject To E-Discovery Under Recent Ruling: Talk With Your Legal Counsel About The IT Issues
Friday, June 29th, 2007Late last year I blogged about the new E-Discovery Rule that took effect on December 1, 2006.
I wrote “The Business Leader Data Retention and E-Discovery Primer” discussing the issues, and I also wrote an article discussing the e-discovery issues for which IT must be involved, “E-Discovery Quagmires.”