Posts Tagged ‘privacy policy’
Monday, February 4th, 2008
For the past few years the Ponemon Institute has done surveys to determine the U.S. companies most trusted to protect privacy.
(more…)
Tags:awareness and training, Information Security, IT compliance, policies and procedures, Ponemon Institute, privacy, Privacy Award, privacy policy, risk management, security awareness, security training
Posted in Privacy and Compliance | No Comments »
Friday, February 1st, 2008
Today I got a death threat email message. This particular type of spam is not really new, but because they will be very scary for most people to get, many recipients will fall for them.
The address header and text of the message reads:
(more…)
Tags:awareness and training, death threat, FBI, Information Security, Infragard, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training, spam
Posted in Information Security | No Comments »
Friday, February 1st, 2008
Another country appears to be on the verge of passing a privacy breach notice law…
(more…)
Tags:Australia, awareness and training, breach notice law, Information Security, IT compliance, Karen Curtis, policies and procedures, privacy, privacy law, privacy policy, risk management, security awareness, security training
Posted in Laws & Regulations | No Comments »
Thursday, January 31st, 2008
When I started blogging a couple of years ago (actually in January 2006…just realized I passed my anniversary!), I would not only post daily to my blog, but I would also publish 3 – 4 research papers or white papers to this site each month. Last year I stopped doing that and spent more time providing more analysis and opinions within my daily blog postings.
(more…)
Tags:awareness and training, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Miscellaneous | 2 Comments »
Thursday, January 31st, 2008
Today, “Internet failure hits two continents”
Were you impacted? If you were, then you probably aren’t reading this right now… 🙂
(more…)
Tags:awareness and training, BCP, business continuity planning, CNN, disaster recovery, DRP, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security | No Comments »
Thursday, January 31st, 2008
Today, “Internet failure hits two continents”
Were you impacted? If you were, then you probably aren’t reading this right now… 🙂
(more…)
Tags:awareness and training, BCP, business continuity planning, CNN, disaster recovery, DRP, Information Security, IT compliance, policies and procedures, privacy, privacy policy, risk management, security awareness, security training
Posted in Information Security | No Comments »
Wednesday, January 30th, 2008
While scanning the news blurb summaries today, the statement, “This is a violation of HIPAA.” caught my eye. Hmm…let’s see what this is about…
This statement was actually within the reader comments to the story, “Blue Cross reports theft of computer.”
(more…)
Tags:awareness and training, Blue Cross/Blue Shield, encryption, HIPAA, Information Security, IT compliance, patient privacy, PHI, PII, policies and procedures, privacy, privacy policy, protected health information, risk management, security awareness, security training, stolen laptop
Posted in Privacy Incidents | 3 Comments »
Wednesday, January 30th, 2008
While scanning the news blurb summaries today, the statement, “This is a violation of HIPAA.” caught my eye. Hmm…let’s see what this is about…
This statement was actually within the reader comments to the story, “Blue Cross reports theft of computer.”
(more…)
Tags:awareness and training, Blue Cross/Blue Shield, encryption, HIPAA, Information Security, IT compliance, patient privacy, PHI, PII, policies and procedures, privacy, privacy policy, protected health information, risk management, security awareness, security training, stolen laptop
Posted in Privacy Incidents | 2 Comments »
Tuesday, January 29th, 2008
Tags:AccuSearch, awareness and training, FTC Act, Information Security, IT compliance, policies and procedures, pretexting, privacy, privacy policy, risk management, security awareness, security training
Posted in Non-compliance Sanctions Examples | No Comments »
Tuesday, January 29th, 2008
Tags:AccuSearch, awareness and training, FTC Act, Information Security, IT compliance, policies and procedures, pretexting, privacy, privacy policy, risk management, security awareness, security training
Posted in Non-compliance Sanctions Examples | No Comments »