Items Tagged with "Policies and Procedures"


37d5f81e2277051bc17116221040d51c

Is There a Risk in Using My Personal Device for Work?

July 24, 2012 Added by:Robert Siciliano

“Bring your own device” (BYOD) has become widely adopted to refer to workers bringing their personal mobile devices, such as smartphones, tablets and PDAs, into the workplace for use and connectivity. Because your employer is liable for potentially lost data, if you BYOD, plan on giving up some liberties...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NLRB Issues Report on Employer Social Media Policies

July 19, 2012 Added by:David Navetta

Specifically, in the latest report, among other issues, the NLRB thoroughly discusses prohibitions on disclosing confidential and proprietary information, posting photographs and other content that depicts other people, and requiring reporting of policy violations. Here are some important take-aways...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

The Compliance Professional as a Trusted Advisor

July 18, 2012 Added by:Thomas Fox

Compliance is ar form of risk you can measure, evaluate and then manage. If the risk becomes too great, that may create an unacceptable level which your company will not tolerate. One of your key roles of a compliance practitioner is to reduce the level of risk which your company cannot or will not tolerate...

Comments  (0)

94c7ac665bbf77879483b04272744424

BYOD is a Bunch of FUD

July 16, 2012 Added by:Marc Quibell

Times have changed , and I'm not talking about the technologies involved. I'm talking about the rules and regulations we have to follow, and the best practices we as employees must abide by - as opposed to the days of the old briefcase - when it comes to protecting the data with which we are entrusted...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

GAO: Aligning Electronic and Cyber Warfare Operations

July 16, 2012

DOD has taken steps to address a critical electronic warfare management gap, but it has not established a departmentwide governance framework for electronic warfare. DOD’s oversight of electronic warfare capabilities may be further complicated by its evolving relationship with computer network operations...

Comments  (0)

E85787adcaf7bca10e799cfd1cfd08f1

Beware of BYOD Wreaking Havoc

July 13, 2012 Added by:Michelle Drolet

The downside to the BYOD movement is the difficulty of maintaining security. How do IT departments provide easy access to documents and files for a host of different devices and still ensure that sensitive material remains safe and workplace systems are not exposed to serious threats? How can they safeguard networks?

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

BYOD: The Reality of Allowing Foreign Bodies into Your Network

July 12, 2012 Added by:Rafal Los

We're getting compromised left and right by devices we are delusional enough to think we can trust because we feel like we've got sufficient control... Where does it end? Here, right at the point where we become cognizant of the fact that no asset, corporate or otherwise, should ever really be trusted...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Navigating the Minefield of Mobile Technology Purchasing

July 10, 2012 Added by:Patrick Oliver Graf

In organizations, there is a constant struggle between satisfying the technological needs of workers while maintaining an adherence to compliance and security. Remote access represents the next major iteration of this battle. This complexity also means there’s far more overlap between the pain points...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FCC Seeks Public Comment on Mobile Data Collection Policies

July 10, 2012 Added by:David Navetta

The FCC revived an inquiry first launched in 2007 to investigate telecom carriers’ practices regarding the privacy and security of information stored on mobile communications devices, prompted by the recent controversy in which software installed on mobile phones was shown to be collecting data from customers...

Comments  (2)

C787d4daae33f0e155e00c614f07b0ee

Spring Cleaning for Your Security Toolbox

July 08, 2012 Added by:Robb Reck

Give each system and process a priority rating. The ones with the highest rating get the training, money and man-power assigned to master, maintain and run them. The ones with lower ratings get a project plan set up for decommissioning. As in most things in life, true excellence is in quality, not quantity...

Comments  (0)

7da15e2ad2a36348401730e0d92d7e33

IT Risk Management: Roadmap for a Roadmap

July 03, 2012 Added by:Jared Pfost

Most IT organizations aren't equipped or supported to build a mature program. If our objective is to deliver an evidence driven investment road map aligned with the business, it's OK to plan a phased approach and demonstrate value while the culture, process, and necessary resources gain momentum...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Lack of Basic Security Practices Results in $1.7 Million Sanction

July 02, 2012 Added by:Rebecca Herold

“This is OCR’s first HIPAA action against a state agency and we expect organizations to comply with their obligations under these rules regardless of whether they are private or public entities.” Bottom line for all organizations of all sizes: It is wise to learn from the pain of others...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Legal Implications of BYOD Part II: Preparing Use Policies

June 26, 2012 Added by:David Navetta

Unfortunately, implementing a BYOD strategy and developing personal device use policies is not a one-size-fits-all cookie cutter exercise. In most cases significant privacy, security and legal challenges exist, and those challenges will vary depending on a multitude of factors that are specific to the organization...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Messaging Misjudgments Kill Careers

June 25, 2012 Added by:Rebecca Herold

Personal and explicit messages sent through business systems could very well become widely known to the public in a very damaging and humiliating way. There are many e-discovery and open records laws that provide access to business email systems. You can ruin your business, and possibly personal life...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Breaking the Enigma Code: Creating a Functioning Compliance Culture

June 25, 2012 Added by:Thomas Fox

New York Times reporter Adam Bryant recently profiled Angie Hicks, one of the co-founders of Angie’s List, who has some interesting observations on leadership that I found applicable to creating a functional compliance effort within an organization, from compliance professionals to ethical leadership...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Two-Thirds of Management Don’t Know Where Their Data Is

June 25, 2012 Added by:Headlines

“The most disturbing findings were the number of companies that report they have no way to track what data is being stored in the cloud, no process to manage access to that data (or plans to do so), and that management doesn’t know where enterprise data is stored. This should act as a wakeup call for organizations..."

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »