Posts Tagged ‘third party security’

Judgment For Disclosing PII To Business Partners: Explicit Opt-In Is Required

Friday, February 27th, 2009

I just ran across the judgment for an interesting case involving privacy and opt-in consent for disclosing personally identifiable information (PII)…

(more…)

Judgment For Disclosing PII To Business Partners: Explicit Opt-In Is Required

Friday, February 27th, 2009

I just ran across the judgment for an interesting case involving privacy and opt-in consent for disclosing personally identifiable information (PII)…

(more…)

Example Of Why Business Leaders MUST Ensure Third Party Security

Monday, December 15th, 2008

Below is a good example of why organizations need to do third party (vendor, outsourcers, business partners, etc.) information security and privacy program reviews. A very important sentence to show your business leaders who don’t think they need to ensure third party security is, “The lender made the data vulnerable, the complaint alleges, by allowing a third-party home seller to access the data without taking reasonable steps to protect it.”

(more…)

Insider Threat: Contractor Sabotages Space Shuttle Endeavour

Wednesday, August 1st, 2007

It feels like I’ve been writing a lot about the insider threat lately, but then again, it seems I read about a new incident caused by insiders almost daily. So much time, effort and money is spent on keeping the outsiders from getting to systems and data, but a comparatively little amount is spent on addressing, and trying to prevent, insiders from doing bad things. Folks who are trusted and have authorized access can do so much harm. The technologies focusing on the outsiders are not going to do much to protect your information from insiders.

(more…)

Insider Threat and Cowboys: The Wall Street Journal Tells Your Personnel How To Get Around Your Security

Tuesday, July 31st, 2007

Oh, boy, reading this Wall Street Journal story, “Ten Things Your IT Department Won’t Tell You” brought back some memories of personnel who went to great lengths to get around security requirements!

(more…)