Here’s a great article for Christmas Eve that covers a wide range of surveillance tools and techniques that are increasingly used by governments, law enforcement, employers, suspicious spouses, etc, etc, etc…
Posts Tagged ‘privacy training’
Santa Sees All; But Puts The U.S. On Naughty List For Poor Privacy Practices…?
Wednesday, December 24th, 2008FEMA Records Of 16,000 Katrina Victims Posted Online
Tuesday, December 23rd, 2008How did the following happen…there are many options…insider threat? Poor IT storage controls? Poor applications development controls? Perhaps using real personally identifiable information (PII) for test purposes? Hacker break-in? Through an outsourced company with access to the PII, but who also had poor controls? There are so many possibilities…
Information Security & Privacy Training Should NOT Be Optional
Monday, December 22nd, 2008Over the past couple of weeks I’ve heard three different information security and privacy officers talk about making information security and privacy training within their organizations optional…not required…for personnel who have access to information assets and personally identifiable information (PII). Leaving training to the discretion of employees is very risky!
HHS’s New Privacy & Security Framework Based Upon The OECD Privacy Principles
Friday, December 19th, 2008Earlier this week, the Department of Health and Human Services issued a framework, “Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information December 15, 2008” for protecting patient privacy and securing medical records, in particular online protected health information (PHI) records.
Effective & Unique Information Security and Privacy Training & Fun Stuff
Thursday, December 18th, 2008One of my areas of expertise, and a great passion of mine, is information security, privacy and compliance training and awareness activities. No organization will have a successful information security or privacy program without having effective training and ongoing awareness communications. Humans are the most vulnerable, as well as most valuable, component of an information security program. You MUST communicate to your personnel what they need to do to effectively safeguard information…such knowledge is not innate!
One of the most measurably and visibly effective training events I have ever done over the past couple of decades is having employee teams or departments throughout the organization compete with each other to identify the most information security and privacy risks…
Blackberry Disposal Lessons From McCain & Palin
Tuesday, December 16th, 2008Another real-life example to show the importance of having effective policies and procedures in place for not only information disposal, but also for the disposal of computers and storage media…
Example Of Why Business Leaders MUST Ensure Third Party Security
Monday, December 15th, 2008Below is a good example of why organizations need to do third party (vendor, outsourcers, business partners, etc.) information security and privacy program reviews. A very important sentence to show your business leaders who don’t think they need to ensure third party security is, “The lender made the data vulnerable, the complaint alleges, by allowing a third-party home seller to access the data without taking reasonable steps to protect it.”
ED and HHS Gives Guidance for HIPAA and FERPA Relationship
Friday, December 12th, 2008New Family Educational Rights and Privacy Act (FERPA) Regulations
Thursday, December 11th, 2008New FERPA Regulations were issued yesterday…