Posts Tagged ‘privacy’

Were You Taken Offline?

Thursday, January 31st, 2008

Today, “Internet failure hits two continents
Were you impacted? If you were, then you probably aren’t reading this right now… 🙂

(more…)

A Stolen Health Insurer’s Laptop With PII Is Not Necessarily A HIPAA Violation

Wednesday, January 30th, 2008

While scanning the news blurb summaries today, the statement, “This is a violation of HIPAA.” caught my eye. Hmm…let’s see what this is about…
This statement was actually within the reader comments to the story, “Blue Cross reports theft of computer.”

(more…)

A Stolen Health Insurer’s Laptop With PII Is Not Necessarily A HIPAA Violation

Wednesday, January 30th, 2008

While scanning the news blurb summaries today, the statement, “This is a violation of HIPAA.” caught my eye. Hmm…let’s see what this is about…
This statement was actually within the reader comments to the story, “Blue Cross reports theft of computer.”

(more…)

AccuSearch Fined ~$200,000 For Pretexting & Selling Phone Numbers

Tuesday, January 29th, 2008

Yesterday the U.S. Federal Trade Commission (FTC) announced AccuSearch, Inc., was guilty of violating federal law by selling consumer phone records to third parties without consumers’ knowledge or authorization.

(more…)

AccuSearch Fined ~$200,000 For Pretexting & Selling Phone Numbers

Tuesday, January 29th, 2008

Yesterday the U.S. Federal Trade Commission (FTC) announced AccuSearch, Inc., was guilty of violating federal law by selling consumer phone records to third parties without consumers’ knowledge or authorization.

(more…)

Cell Phone Text Messages Are Private…NOT!

Monday, January 28th, 2008

Uh oh…talk about a couple of folks who were caught with their hand in the cookie jar (so to speak)…and caught lying under oath.
CNN recently ran a story about how Christine Beatty resigned from her position as chief of staff for Detroit, Michigan, Mayor Kwame Kilpatrick after a large amount of explicit Blackberry text messages, “tens of thousands” were discovered from 2003 and 2004.

(more…)

Cell Phone Text Messages Are Private…NOT!

Monday, January 28th, 2008

Uh oh…talk about a couple of folks who were caught with their hand in the cookie jar (so to speak)…and caught lying under oath.
CNN recently ran a story about how Christine Beatty resigned from her position as chief of staff for Detroit, Michigan, Mayor Kwame Kilpatrick after a large amount of explicit Blackberry text messages, “tens of thousands” were discovered from 2003 and 2004.

(more…)

Some more information and ideas for Data Privacy Day, January 28

Sunday, January 27th, 2008

Last Thursday I posted about how tomorrow (1/28) is International Data Privacy Day.
I was delighfully surprised to receive an email in response to my blog post from Leonardo Cervera, the coordinator of Data Privacy Day 2008! Be sure to check out his site to find comprehensive information about all the activities being done for Data Privacy Day, as well as seeing the world-wide support Data Privacy Day is being given…it is good to see government agencies and large corporations acknowledging the importance of preserving privacy.

(more…)

Some more information and ideas for Data Privacy Day, January 28

Sunday, January 27th, 2008

Last Thursday I posted about how tomorrow (1/28) is International Data Privacy Day.
I was delighfully surprised to receive an email in response to my blog post from Leonardo Cervera, the coordinator of Data Privacy Day 2008! Be sure to check out his site to find comprehensive information about all the activities being done for Data Privacy Day, as well as seeing the world-wide support Data Privacy Day is being given…it is good to see government agencies and large corporations acknowledging the importance of preserving privacy.

(more…)

Insider Threat: Worker Deletes 7 Years of Files; Lesson? Make Backups!!

Friday, January 25th, 2008

Here is another example of what a worker, entrusted with access to business files, can do…and also provides a lesson about business continuity…
I just watched a CNN clip, “Cyber Sabotage” that provides a very good example of how costly the insider threat can be.

(more…)