Blog Posts Tagged with "Personally Identifiable Information"

5e402abc3fedaf8927900f014ccc031f

Should Businesses Be Able to Google Customers?

July 08, 2012 Added by:Allan Pratt, MBA

It should come as no surprise that businesses are taking advantage of the public’s fascination of placing their day-to-day activities on social networking sites. This may seem inappropriate and offensive, and it might be – but for the moment, it’s not illegal. We have only ourselves to blame...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Lack of Basic Security Practices Results in $1.7 Million Sanction

July 02, 2012 Added by:Rebecca Herold

“This is OCR’s first HIPAA action against a state agency and we expect organizations to comply with their obligations under these rules regardless of whether they are private or public entities.” Bottom line for all organizations of all sizes: It is wise to learn from the pain of others...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Alert: Fake FBI Emails Seek Personal Information

June 26, 2012 Added by:Headlines

The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Data Security: Spokeo in the News

June 23, 2012 Added by:Allan Pratt, MBA

“Spokeo, which compiles dossiers on consumers, agreed to pay $800,000 to settle allegations by the Federal Trade Commission that it sold personal information in violation of the law. From 2008 to 2010, Spokeo sold millions of consumer profiles to human resources departments and recruiters..."

Comments  (1)

11146d62a6c31fb9fac8ac8ac991e08d

We Don’t Need Cyber-Vigilante Justice

June 15, 2012 Added by:Andy Willingham

You see what made me so mad? It wasn’t the release of the PII of all those innocent people, it was their reason for doing it. They reported a web site vulnerability and it wasn’t fixed, so they decided to post PII of thousands of people on the internet. Who put them in the role of deciding who wins and who loses?

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Global Payments Breach May Include Merchant Account Data

June 13, 2012 Added by:Headlines

"The Company's ongoing investigation recently revealed potential unauthorized access to servers containing personal information collected from a subset of merchant applicants. It is unclear whether the intruders looked at or took any personal information... however, the Company will notify potentially-affected individuals..."

Comments  (0)

959779642e6e758563e80b5d83150a9f

Can You Use Dropbox for Storing Healthcare Data?

June 11, 2012 Added by:Danny Lieberman

The short answer is that you should not store PHI (protected health information) on Dropbox since they share data with third party applications and service providers - but the real reason is you should not use Dropbox for sharing information with patients is simply that it is not private by design...

Comments  (0)

94c7ac665bbf77879483b04272744424

LinkedIn Fails Security Due Diligence

June 07, 2012 Added by:Marc Quibell

Poor security practices led to the password database ending up in Russia. We can also say that the best security practices were not applied to the security of our passwords: LinkedIn did not "salt their hash" and therefore the passwords were much more vulnerable to simple brute force attacks...

Comments  (0)

959779642e6e758563e80b5d83150a9f

How to Keep Healthcare Secrets Online

June 06, 2012 Added by:Danny Lieberman

When we share medical information with our healthcare provider, we trust their information security as being strong enough to protect our medical information from a data breach. Certainly – as consumers of healthcare services, it’s impossible for us to audit the effectiveness of their security portfolio...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC MySpace Settlement: Say What You Do and Do What You Say

May 30, 2012 Added by:David Navetta

The settlement bars MySpace from making future misrepresentations regarding the extent to which it protects users’ personal information, requires it to implement a comprehensive privacy program and requires it to undergo biennial, independent, third party privacy assessments for the next 20 years...

Comments  (0)

Af9c34417f8e5e0d240850bb353b5d40

I Hope Edo is Worth the Privacy Risk

May 16, 2012 Added by:Keith Mendoza

About a week ago, I read about this new daily deal service called edo that ties to your bank account, and the first thing that came to my mind is “uh oh, another attack vector into my bank info”. Here are a list of features that are those potential attack vectors...

Comments  (2)

94c7ac665bbf77879483b04272744424

Where is My Information?!?!

May 10, 2012 Added by:Marc Quibell

Here's the problem - too many people have too much information about you, stored in or on who-knows-what, and who-knows-where. The risks of having your identity stolen and used are astronomical. All it requires is someone on the receiving end putting it all together...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Healthcare Data and the (Private) Social Network

May 09, 2012 Added by:Danny Lieberman

Previously, we talked about the roles that trust, security and privacy play in online healthcare interactions. In this post we look at privacy challenges in social networks and describes how you can implement a private healthcare social network for without government regulation...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Six Good Reasons to De-Identify Data

May 08, 2012 Added by:Rebecca Herold

Even though it sounds complicated there are many good methods you can use to accomplish de-identification. The great thing is, under many legal constructs de-identification is an acceptable way to use personal information for purposes beyond which the personal data was collected...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Healthcare Data: I Trust You to Keep this Private

May 03, 2012 Added by:Danny Lieberman

In this article, Danny Lieberman talks about the roles that trust, security and privacy play in online healthcare interactions. At the end of the article, he introduces the idea of private social networking for healthcare – leaving the piece open for a sequel...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

On the Growth of Identity Theft

May 01, 2012 Added by:Pierluigi Paganini

It is clear that criminal organizations are devoting substantial resources in this sector. An increasing component of organized crime is specializing in this kind of activity characterized by high profits and low risks compared to traditional criminal activities...

Comments  (2)

Page « < 1 - 2 - 3 - 4 - 5 > »