Posts Tagged ‘security training’

HHS’s New Privacy & Security Framework Based Upon The OECD Privacy Principles

Friday, December 19th, 2008

Earlier this week, the Department of Health and Human Services issued a framework, “Nationwide Privacy and Security Framework For Electronic Exchange of Individually Identifiable Health Information December 15, 2008” for protecting patient privacy and securing medical records, in particular online protected health information (PHI) records.

(more…)

Effective & Unique Information Security and Privacy Training & Fun Stuff

Thursday, December 18th, 2008

One of my areas of expertise, and a great passion of mine, is information security, privacy and compliance training and awareness activities. No organization will have a successful information security or privacy program without having effective training and ongoing awareness communications. Humans are the most vulnerable, as well as most valuable, component of an information security program. You MUST communicate to your personnel what they need to do to effectively safeguard information…such knowledge is not innate!
One of the most measurably and visibly effective training events I have ever done over the past couple of decades is having employee teams or departments throughout the organization compete with each other to identify the most information security and privacy risks…

(more…)

FTC Publishes Report On SSNs and Identity Theft

Wednesday, December 17th, 2008

Today the U.S. Federal Trade Commission (FTC) released a new report about social security numbers (SSNs), identity theft, and recommended 5 ways to help prevend having SSNs being used for identity theft…

(more…)

Blackberry Disposal Lessons From McCain & Palin

Tuesday, December 16th, 2008

Another real-life example to show the importance of having effective policies and procedures in place for not only information disposal, but also for the disposal of computers and storage media…

(more…)

Example Of Why Business Leaders MUST Ensure Third Party Security

Monday, December 15th, 2008

Below is a good example of why organizations need to do third party (vendor, outsourcers, business partners, etc.) information security and privacy program reviews. A very important sentence to show your business leaders who don’t think they need to ensure third party security is, “The lender made the data vulnerable, the complaint alleges, by allowing a third-party home seller to access the data without taking reasonable steps to protect it.”

(more…)

ED and HHS Gives Guidance for HIPAA and FERPA Relationship

Friday, December 12th, 2008

I saw some interesting news from the OS OCR Privacy List listserve. If you are with an education institution or a healthcare covered entity, take some time to read the new guidance about the relationship between FERPA and HIPAA

(more…)

New Family Educational Rights and Privacy Act (FERPA) Regulations

Thursday, December 11th, 2008

New FERPA Regulations were issued yesterday…

(more…)

New Family Educational Rights and Privacy Act (FERPA) Regulations

Thursday, December 11th, 2008

New FERPA Regulations were issued yesterday…

(more…)

Domain Name Hell…Deja Vu All Over Again!

Wednesday, December 10th, 2008

Last night I thought it odd that I did not receive any email messages after around 8pm. And this morning, it was V E R Y odd that I did not have the usual bunch of overnight spam in my inbox…
What’s up with this?

(more…)

Insider Threats Even More Significant During Down Economy

Tuesday, December 9th, 2008

I’ve written a lot about the insider threat, and the many different motivations for insiders to do malicious things (in addition to the other two types of insider threats of mistakes and lack of awareness).
Here are a couple of recently published research reports that shows how this horrible economy is impacting information security and making organizations even more vulnerable to privacy breaches…

(more…)