Blog Posts Tagged with "Confidentiality"

44fa7dab2a22dc03b6a1de4a35b7834a

Contracts and Information Security Part 2: NDAs

June 13, 2012 Added by:Bill Gerneglia

NDAs might include potential liability for unauthorized disclosure of protected personal information, privileged communications (such as lawyer-client or doctor-patient communications), national secrets, or the trade secrets of the company or business partner...

Comments  (0)

959779642e6e758563e80b5d83150a9f

How to Keep Healthcare Secrets Online

June 06, 2012 Added by:Danny Lieberman

When we share medical information with our healthcare provider, we trust their information security as being strong enough to protect our medical information from a data breach. Certainly – as consumers of healthcare services, it’s impossible for us to audit the effectiveness of their security portfolio...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Is Cloud Security in the Clouds?

May 09, 2012 Added by:Jayson Wylie

Cloud security threats can come from the lack of designed and implemented security by the provider. This may be intentional or not but the lack of oversight or negligence in this area can potentially cause disputes over the difference of control versus accountability...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Ninth Circuit Narrows Computer Fraud and Abuse Act Reach

May 07, 2012 Added by:David Navetta

The crux is the recent application of the Computer Fraud and Abuse Act criminalizing violations of website terms of use and employer restrictions on employee computer uses, stemming in particular from what the statute’s term “exceeds authorized access” does and does not mean...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Dismisses Zeus Botnet Takedown Criticism

April 17, 2012 Added by:Headlines

"The chief criticism is that the Microsoft operation exposed sensitive information that a handful of researchers had shared in confidence, and that countless law enforcement investigations may have been delayed or derailed as a result..."

Comments  (0)

82ac4cd789b46af43c0cde730625317e

Data Classification: Why it is Important for Information Security

April 02, 2012 Added by:Christopher Rodgers

Once you know which data needs the most protection, you can properly allocate funds and resources to defend those assets. Employing a proper data classification scheme is cost effective, as it allows a business to focus on protecting its higher risk data assets...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Data Classification and Controls Policy for PCI DSS

March 01, 2012 Added by:Danny Lieberman

The first step in protecting customer data is to know what sensitive data you store, classify what you have and set up the appropriate controls. Here is a policy for any merchant or payment processor who wants to achieve and sustain PCI DSS 2.0 compliance and protect data...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Data Security Ramifications of E-Waste

April 28, 2011 Added by:Allan Pratt, MBA

What are the data security and compliance implications if you have all of your confidential data on your computer hard drive or laptop? What if you are a policeman, school teacher, or lawyer – and the contact list on your phone includes information you are legally bound to not share?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Breaches By Infamous Insiders

January 07, 2011 Added by:Headlines

The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Is Social Networking Disclosing Your Trade Secrets?

November 05, 2010 Added by:David Navetta

Periodically review the various use, privacy, copyright and other policies social networking sites to ensure that your employees aren't binding you to provisions you were unaware of or that may result in disclosure of confidential or trade secret information by default...

Comments  (0)