Items Tagged with "Legal"
Lessons Learned for the Compliance Practitioner
July 09, 2012 Added by:Thomas Fox
The DOJ recently announced the resolution of a compliance matter involving violations by Data Systems & Solutions LLC. In reading the Criminal Information, this was no one-off or rogue employee situation, this was a clear, sustained and well known scheme that went on within the company...
Comments (0)
Internet Users Again Shut Out of Secret TPP Negotiations
July 05, 2012 Added by:Electronic Frontier Foundation
We don’t know what’s in the current version of the TPP’s IP chapter - the public has only seen a leaked version. Given what we've seen in this leak, we have every right to be furious that representatives are negotiating an agreement that will harm online expression, privacy, and innovation on the Internet...
Comments (0)
Time for Congress to Pledge to Uphold Internet Freedom
July 03, 2012 Added by:Electronic Frontier Foundation
Congress has attempted to legislate in favor of corporations and law enforcement at the expense of its users’ basic rights. Netizens’ strong desire to keep the Internet open and free has been brushed aside as naïve and inconsequential, in favor of lobbyists and special interest groups. Well, no longer...
Comments (0)
Falconstor Software Conspired to Bribe Chase Executives
July 02, 2012 Added by:Headlines
The U.S. Attorney’s Office filed a criminal complaint against FalconStor Software, a data storage and protection company, alleging that the company conspired to pay more than $300,000 in bribes to executives of J.P. Morgan Chase Bank to obtain over $12 million in electronic storage licencing contracts...
Comments (0)
EFF Staff to Present at Hackers on Planet Earth
July 01, 2012 Added by:Electronic Frontier Foundation
Technologies are transforming our society, and when our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. Hackers On Planet Earth (HOPE), one of the most creative and diverse hacker events in the world...
Comments (0)
The Right to Internet Anonymity and Legal Implications
June 28, 2012 Added by:Pierluigi Paganini
Anonymizing services are based on the concept of distribution of routing information during a transmission. It is not known prior the path between a source and destination, and every node of the network manages minimal information to route the packets to the next hop without preserving history of the path...
Comments (0)
Two Northeast States Updated Breach Notification Statutes
June 27, 2012 Added by:David Navetta
Much time and ink has been spent on the steady stream of data security and breach-related bills that spring up in Congress like mushrooms after a rain. But recently Vermont and Connecticut updated their existing breach notification statutes, highlighting the need to monitor state legislatures...
Comments (0)
OpJapan: Anonymous vs. Japan and its War on Piracy
June 27, 2012 Added by:Pierluigi Paganini
"Anonymous strongly believes that the implementation of this law will... solve nothing. To the government of Japan and the Recording Industry Association of Japan, you can now expect us the same way we have come to expect you in violating our basic rights to privacy and to an open internet..."
Comments (0)
Government Insists It Can’t Be Sued Over Warrantless Wiretapping
June 26, 2012 Added by:Electronic Frontier Foundation
In three separate lawsuits that have been churning in the federal courts, the government has used a menu of dodges to block the courts from considering the key underlying question — have they been breaking the law and violating the constitution by warrantlessly surveilling American citizens — over and over again...
Comments (0)
Legal Implications of BYOD Part II: Preparing Use Policies
June 26, 2012 Added by:David Navetta
Unfortunately, implementing a BYOD strategy and developing personal device use policies is not a one-size-fits-all cookie cutter exercise. In most cases significant privacy, security and legal challenges exist, and those challenges will vary depending on a multitude of factors that are specific to the organization...
Comments (0)
Messaging Misjudgments Kill Careers
June 25, 2012 Added by:Rebecca Herold
Personal and explicit messages sent through business systems could very well become widely known to the public in a very damaging and humiliating way. There are many e-discovery and open records laws that provide access to business email systems. You can ruin your business, and possibly personal life...
Comments (0)
Breaking the Enigma Code: Creating a Functioning Compliance Culture
June 25, 2012 Added by:Thomas Fox
New York Times reporter Adam Bryant recently profiled Angie Hicks, one of the co-founders of Angie’s List, who has some interesting observations on leadership that I found applicable to creating a functional compliance effort within an organization, from compliance professionals to ethical leadership...
Comments (0)
Control Systems Company Resolves Criminal Violations
June 25, 2012 Added by:Headlines
Data Systems & Solutions LLC, a company based in Reston, Virginia, that provides design, installation, maintenance, and other services at nuclear and fossil fuel power plants, has agreed to pay an $8.82 million criminal penalty to resolve FCPA compliance violations...
Comments (0)
Hacking Strikes Fear in the Heart of Texas Bureau of Prisons
June 24, 2012 Added by:Electronic Frontier Foundation
Whether you call them hackers, makers, tinkerers, or information security researchers, people on the hacking spectrum have been a boon to society for decades. They power innovation in all sectors and operate as a valuable check on the security and stability of the technology that forms the basis for our society...
Comments (0)
Suing Our Way to Better Security?
June 21, 2012 Added by:Jayson Wylie
It does not seem like the top leaders at organizations are as concerned with others' information as they might be with the bottom line. If organizations do not respond to fear of embarrassment for failing at security, should we start taking them to court to formulate better consumer protections?
Comments (7)
Contracts and Infosec Part 3: Processing and Data Disposal
June 21, 2012 Added by:Bill Gerneglia
The parties should also stipulate their expectations for data return or destruction upon termination of an NDA. The expectations for data return or destruction will be typically molded by a party’s desire to keep compliant with the particular data handling law or regulation to which the party is subject...