Posts Tagged ‘privacy’

43 U.S. Breach Notice Laws…And Counting

Tuesday, May 20th, 2008

There are currently 43 breach response laws in the U.S.; this includes the District of Columbia and Puerto Rico.

(more…)

Do Your Terms Of Use Try To Gut Your Privacy Policy Promises?

Sunday, May 18th, 2008

I see a growing trend in organizations trying to gut the promises made in their website privacy policies through sneaky wording they place in their rarely read “Terms of Use” statements.
Over the past few months I have heard from some CISOs and CPOs who are concerned at some of the wording that their legal counsels are suggesting they put on their web sites. And rightly so. Why? Because the considered “Terms of Use” statements seem to be, 1) trying to eliminate all liability to the organization for anything bad that happens to the personally identifiable information (PII) submitted to or accessed from the site; 2) basically nullifying the posted privacy policy; and 3) trying to require the website user to agree to these terms just by using the site…no active acknowledgment or agreement necessary.
Here is a composite from around half of a dozen of these worrisome passages from the considered drafted Terms of Use statements that I’ve seen…

(more…)

SEC Regulation S-P Proposals To Improve The Security Of Customer Information Within Brokerage Shops

Friday, May 16th, 2008

Do you work for a brokage house, have a subsidiary that is a brokerage house, or do any type of work with a brokerage house? If so, then you should be aware of the Securities and Exchange Commission (SEC) proposed changes to Regulation S-P in March of this year.
In general, the proposed amendments to Regulation S-P…

(more…)

CAN-SPAM: Record Judgment Along With Updated Rules

Thursday, May 15th, 2008

I was at the Secure360 conference (a fabulous event, btw) this week, and I’m just getting to an important current topic: CAN-SPAM.
On Monday (5/12) the FTC announced an update to the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM) law.

(more…)

Addressing the Insider Threat

Tuesday, May 13th, 2008

My May issue of “IT Compliance in Realtime” is now available!
The first article I have within this issue is, “Addressing the Insider Threat.”
Here is the unformatted text of the article; download the PDF to get the much nicer, prettier, formatted version…

(more…)

At the Secure 360 Conference

Monday, May 12th, 2008

Tomorrow and Wednesday I’m doing some sessions at the Secure 360 conference in St. Paul, Minnesota. I’m really looking forward to also seeing the other sessions while here (yes, I’ve arrived and getting some work done in my room)!

(more…)

Happy Mother’s Day!

Sunday, May 11th, 2008

Happy Mother’s Day! It was a gorgeous day here in central Iowa! I did business work all morning, but then took off at 3:00pm, went out with my family to a restaurant we all love, and then did some gardening; tomatoes, turnips, watermelon, peppers, pumpkins, sunflowers and sweet corn this year…plus a few pretty assorted annuals! The fruit trees, red buds, crab apple trees, Russian olives, and wigelias are all in full bloom right now…and the scent of the breeze is spectacular! 🙂
In honor of Mother’s Day I quickly scanned the news and blog sites to see what types of interesting information I could find relating to mother’s day and privacy. I didn’t find much, but here is a bit of what I found…

(more…)

A Couple Of Little Known HIPAA Facts

Thursday, May 8th, 2008

Last week I was contacted by Corey Goodman, a reporter for HCPro, about a story he is doing that sounds like it will be quite interesting! He is collecting examples and anecdotes about “little know HIPAA facts” and asked me to contribute some for his article.
I anticipate that he will be cutting the couple of little known facts I provided to him down quite a bit, so I wanted to provide them here not only as a future reference for myself, but also for those of you who may be interested!

(more…)

Another Example Of How Internet Information Impacts Employment Decisions

Wednesday, May 7th, 2008

I’ve blogged several times about how employers are inreasingly using information found on the Internet to make hiring, and firing, decisions, such as here and here.
I’ve also written about it several times, such as here.
Here’s another example to add to your files for how information posted to social networking sites, such as MySpace and Facebook, can impact your employment situation where a woman graduating with an education degree was denied teaching credentials, and this is not the first time a situation has occurred similar to this…

(more…)

Revisiting Two Viewpoints Of Outsourcing Vendor Security

Tuesday, May 6th, 2008

While at CSI SX last week, we covered the need to ensure business partners, to whom we outsource information processing and handling, have good security and privacy programs in place within the class I provide with Chris Grillo, “Executive Summit: Security and Privacy Collaboration.”

(more…)