Posts Tagged ‘privacy training’

Study Proves SSNs Are Easily Guessed; Don’t Use SSNs To Verify Identity Or As Passwords!

Monday, July 6th, 2009

It is nice to have scientific evidence of what we’ve been telling business leaders ever since they wanted to start using SSNs as identifiers and passwords!
Today Carnegie Mellon University (CMU) released a very revealing report, “Predicting Social Security numbers from public data” I want to expand upon some of the issues covered within it, and then urge you to communicate effectively to your business leaders the related concerns of your organization…

(more…)

Study Proves SSNs Are Easily Guessed; Don’t Use SSNs To Verify Identity Or As Passwords!

Monday, July 6th, 2009

It is nice to have scientific evidence of what we’ve been telling business leaders ever since they wanted to start using SSNs as identifiers and passwords!
Today Carnegie Mellon University (CMU) released a very revealing report, “Predicting Social Security numbers from public data” I want to expand upon some of the issues covered within it, and then urge you to communicate effectively to your business leaders the related concerns of your organization…

(more…)

Nevada’s New Encryption Law; Made Moot By Its Own Data Breach Law?

Thursday, July 2nd, 2009

On May 30, 2009, Nevada enacted a new law, SB 227, which will basically replace NRS 597.970 in January 2010.
In many ways the new law is an improvement over the much more vague, and brief, NRS 597.970. I want to focus here on an improvement, but something that still leaves much to interpretation; that is, what is meant by “encryption”?

(more…)

Stolen Print Documents With PII Found On Crook; Otherwise UCM Would Not Have Known The Reports Were Stolen

Wednesday, July 1st, 2009

Late last week one of my alma maters, the University of Central Missouri, reported that two printed computer reports containing 7000 students’ names, social security numbers, phone numbers, addresses, and birthdates were stolen from somewhere on the campus.

(more…)

Stolen Print Documents With PII Found On Crook; Otherwise UCM Would Not Have Known The Reports Were Stolen

Wednesday, July 1st, 2009

Late last week one of my alma maters, the University of Central Missouri, reported that two printed computer reports containing 7000 students’ names, social security numbers, phone numbers, addresses, and birthdates were stolen from somewhere on the campus.

(more…)

Hear Common, Dumb and Dangerous Privacy Assumptions On The Radio!

Tuesday, June 30th, 2009

Today I will be on MyTechnologyLawyer.com radio show to an hour program talking about the common privacy mistakes and assumptions made by businesses. This will be a more in-depth look at the issues from my post from a couple of weeks ago, “5 Common, Dumb and Dangerous Privacy Assumptions
Here are the details:

(more…)

Hear Common, Dumb and Dangerous Privacy Assumptions On The Radio!

Tuesday, June 30th, 2009

Today I will be on MyTechnologyLawyer.com radio show to an hour program talking about the common privacy mistakes and assumptions made by businesses. This will be a more in-depth look at the issues from my post from a couple of weeks ago, “5 Common, Dumb and Dangerous Privacy Assumptions
Here are the details:

(more…)

South Carolina & Alaska Privacy Breach Notice Laws Go Into Effect July 1

Monday, June 29th, 2009

This week two more U.S. breach notice laws go into effect…

(more…)

Voice Recognition Software Puts Top Cop In Hot Water

Thursday, June 25th, 2009

Yesterday I read a fascinating story from Australia…

(more…)

Movies and TV Shows to Use for Infosec and Privacy Training and Awareness

Tuesday, June 23rd, 2009

After many long hours, I’ve finally submitted the draft manuscript for the 2nd edition of my “Managing an Information Security and Privacy Awareness and Training Program” book. However, I will still have one more chance to make changes. One of the 23 appendices within my book provides lists of resources; books, web sites, activities, games and so on. One of my lists is for movies and television shows that can be used in training or for awareness activities…

(more…)