We had a very interesting discussion on Twitter this morning about the practice of automatically photographing license plates to use for parking, tickets, etc…
Posts Tagged ‘privacy training’
Pros & Cons Of Surveillance Cameras For Compliance
Thursday, April 2nd, 2009Ongoing Awareness Communications and Regular Training Are Necessary For Effective Information Security & Privacy Programs
Wednesday, April 1st, 2009Scott Wright over at Streetwise Security Zone graciously invited me to do a podcast interview with him to discuss information security, privacy and compliance training and awareness issues. In the last half of February I had the pleasure of taking him up on his invitation!
You can hear the full podcast here.
Here are the notes Scott compiled about our discussion topics:
HIPAA Sanctions and Convictions Will Increase with HITECH Act & New Administration
Tuesday, March 31st, 2009Upon reading and researching HIPAA and the impact of the HITECH Act upon it, basically broadening its applicability as well as adding new requirements for privacy breach notifications, I recently was compelled to write an article about what I foresee as likelihood that, after a very frustratingly slow start (by several years!) of HIPAA enforcement, increasingly more HIPAA sanctions will be made in the coming months and years.
SearchCompliance printed my article in three parts in their Compliance Tips section…
Don’t let differing authority levels damage info sec, privacy & compliance collaboration
Thursday, March 26th, 2009I first realized the need for information security and legal compliance areas to closely collaborate on converging issues in the mid-1990’s while establishing the information security and privacy requirements for one of the first online banks. Over the past 5+ years I’ve been actively evangelizing through my 2-day classes, conference and meeting speeches, and many articles and other publications about the need for information security, privacy and legal compliance areas to collaborate, and pointing out the areas where these responsibilities converge.
Carnegie Mellon’s CyLab Is A Great Resource
Wednesday, March 25th, 2009Many Motivators For Identity Theft
Tuesday, March 24th, 2009I’ve heard far too many business leaders in lesser-regulated industries, of organizations of all sizes, say something to the effect of, “Oh, we don’t have any information that hackers would find of any value.”
There Are 47 US State & Territory Breach Notice Laws: 1-Page Listing
Monday, March 23rd, 2009Over the weekend I did some research to make sure I am up to date with all the current U.S. state and U.S. territories breach notice laws…
Avoid Information Overload In Your Information Security & Privacy Training!
Sunday, March 22nd, 2009I’ve been reviewing some “canned” information security and privacy training offerings in the past few months, and I’m seeing that many of them are trying to dump TOO MUCH information on those taking them; learners can only absorb so much information within a short period of time and retain it for any significant amount of time!
Encryption Solution Reviews
Wednesday, March 18th, 2009Here are some encryption solution reviews, from David Strom at PC World, that anyone who wants to protect their laptop data, as well as information security, and yes privacy, practitioners should find useful…