Posts Tagged ‘privacy professor’

HIPAA/HITECH Compliance Is All or Nothing

Tuesday, August 16th, 2011

I’m seeing growing numbers of  business associates, particularly those who do technology-based services, expressing the belief that they don’t need to worry about complying with most of HIPAA.  I wrote a guest blog post for Credant about this misguided thinking that was published today.  I welcome your feedback!

Don’t Let School Break Be A Privacy Break-In!

Friday, June 3rd, 2011

A couple of days ago I published my monthly Privacy Professor Tips message, “Summer Break-in.”  I provide these tips free to anyone who wants to sign up for it on my web site and fills out one of the boxes that says, (more…)

A Conversation About Privacy On the Internet with Rafal Los

Saturday, February 12th, 2011

I recently engaged in an interesting discussion with Rafal Los about the erosion of privacy as it relates to the Internet in general, and social media sites specifically.  I think my readers will some useful points and insights within our conversation; especially considering the often perceived adversarial relationship between anonymity and privacy.  I welcome your feedback!

So here we go… (more…)

Effective & Unique Information Security and Privacy Training & Fun Stuff

Thursday, December 18th, 2008

One of my areas of expertise, and a great passion of mine, is information security, privacy and compliance training and awareness activities. No organization will have a successful information security or privacy program without having effective training and ongoing awareness communications. Humans are the most vulnerable, as well as most valuable, component of an information security program. You MUST communicate to your personnel what they need to do to effectively safeguard information…such knowledge is not innate!
One of the most measurably and visibly effective training events I have ever done over the past couple of decades is having employee teams or departments throughout the organization compete with each other to identify the most information security and privacy risks…

(more…)