Posts Tagged ‘privacy policy’
Tuesday, February 12th, 2008
This is a sad example of how others take it upon themselves to invade the privacy of others and don’t understand that they’re doing anything wrong…
(more…)
Tags:awareness and training, Information Security, IT compliance, Paula Abdul, personal privacy, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, social networking
Posted in Privacy and Compliance, Privacy Incidents | No Comments »
Monday, February 11th, 2008
Here are two more insider threat incident examples to put into your files and use within your information security and privacy training curriculum and awareness communications:
(more…)
Tags:awareness and training, CNN, Department of Defense, Dongfan Chung, Gregg William Bergersen, Information Security, insider threat, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security | No Comments »
Monday, February 11th, 2008
Hopefully most people know by now that whatever you post on the Internet is not private, and that basically anyone can read it. Hopefully most people know by now that it is a growing trend for employers to use information they find on the Internet in their hiring and firing decisions.
Well, it appears the information found on the Internet can now be used by insurers to make decisions about to whom they will and will not provide insurance.
(more…)
Tags:awareness and training, Beye, Blue Cross Blue Shield, HIPAA, Horizon, Information Security, IT compliance, patient privacy, policies and procedures, privacy, privacy policy, risk management, security awareness, security law, security training
Posted in Privacy and Compliance | No Comments »
Saturday, February 9th, 2008
Tags:awareness and training, cyber crime, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, Saudi Arabia, security awareness, security law, security training
Posted in Laws & Regulations | 1 Comment »
Friday, February 8th, 2008
Here’s an interesting juxtaposition of hacker-related news articles…
When scanning today’s news I saw the headline, “Teen Is World’s Youngest ‘Ethical Hacker’”
(more…)
Tags:awareness and training, ethical hacker, hacker, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, Shane Kelly
Posted in Information Security, Training & awareness | No Comments »
Thursday, February 7th, 2008
Here’s a good article for all information security and privacy pros to read and show their business leaders. If nothing else show them the last paragraph:
(more…)
Tags:awareness and training, Dark Reading, Information Security, IT compliance, Peter Tippett, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security, Privacy and Compliance, Training & awareness | No Comments »
Thursday, February 7th, 2008
Here’s one more thing for IT, Information Security and Privacy folks to put on their list of things to worry about…
(more…)
Tags:awareness and training, Google Apps, Information Security, IT compliance, personally identifiable information, PII, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security | No Comments »
Wednesday, February 6th, 2008
I got a nice message from Brian Honan yesterday letting me know that February 12 is “Safer Internet Day,” or SID for short; (Thanks Brian!)
(more…)
Tags:Athens-Chilesburg Elementary School, awareness and training, Brian Honan, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, Safer Internet Day, security awareness, security training, SID
Posted in Training & awareness | No Comments »
Tuesday, February 5th, 2008
It seems all business leaders would understand by now, after literally thousands of privacy incidents in recent years, that they need to encrypt personally identifiable information (PII) stored on mobile computers and mobile storage devices, and when sending PII through networks.
Even the bad guys understand this.
(more…)
Tags:awareness and training, encryption, Information Security, IT compliance, personally identifiable information, PII, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, surveillance, terrorist
Posted in Information Security | No Comments »
Monday, February 4th, 2008
Here’s something scary…
I just saw a new CNN report that made me go, “Huh?!”
“FBI wants palm prints, eye scans, tattoo mapping”
(more…)
Tags:awareness and training, biometrics, CNN, FBI, George Bush, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, surveillance, wired
Posted in Privacy and Compliance | 3 Comments »