Items Tagged with "Regulation"


68b48711426f3b082ab24e5746a66b36

Cybersecurity Risks in Public Companies: An Infographic

May 07, 2012 Added by:Fergal Glynn

Following new SEC guidance issued relating to disclosure of security risks in company filings, public companies are beginning to be measured by regulators and investors on the strength of their security solution and ability to protect intellectual property and customer data...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Healthcare Data: I Trust You to Keep this Private

May 03, 2012 Added by:Danny Lieberman

In this article, Danny Lieberman talks about the roles that trust, security and privacy play in online healthcare interactions. At the end of the article, he introduces the idea of private social networking for healthcare – leaving the piece open for a sequel...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Remember Public Cellular Networks in Smart Meter Adoption

April 26, 2012 Added by:Brent Huston

ICS/SCADA owners must strive to clearly identify their needs around cellular technologies, clearly demarcate the requirements for private/segmented/public cellular network use and understand the benefits/issues and threats of what they are utilizing...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Four Steps to Follow when Your Credit Card is Compromised

April 23, 2012 Added by:Christopher Burgess

Certification of compliance demonstrates that at that given point of time the entity was in adherence to the PCI standards. The threat landscape is dynamic and ever changing requiring those entrusted with our data to take steps beyond compliance to protect that data...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FTC Final Report Provides Meaningful Protection Online

April 21, 2012 Added by:Electronic Frontier Foundation

Recently, the FT) released a final report on digital consumer privacy after more than 450 companies, advocacy groups and individuals commented on the December 2010 draft. The final report creates strong guidelines for protecting consumer privacy choices in the online world...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Commission Report on Protecting Consumers

April 16, 2012 Added by:David Navetta

The FTC has a front and center role in data privacy and enforcement. We have written extensively about the FTC’s actions and recommendations. How is the final Framework different from the draft Framework and what should your privacy professionals be taking away from the Framework?

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Data Breach Definitions, Costs and Security

April 11, 2012 Added by:Fergal Glynn

Companies that suffer a data breach lose more than just confidential information. Their reputation, productivity, and profitability can all be negatively impacted in the aftermath of even a single incident. The organization may face fines, civil or criminal prosecution...

Comments  (0)

82ac4cd789b46af43c0cde730625317e

Data Classification: Why it is Important for Information Security

April 02, 2012 Added by:Christopher Rodgers

Once you know which data needs the most protection, you can properly allocate funds and resources to defend those assets. Employing a proper data classification scheme is cost effective, as it allows a business to focus on protecting its higher risk data assets...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC to Link Do-Not-Track and Big Data Concerns

April 02, 2012 Added by:David Navetta

The FTC sees a greater threat to consumers in third-party data collection because of lack of notice, choice and transparency in the practices of data collectors. But the challenge is understanding where to draw the line between “first party” and “third party” practices...

Comments  (1)

4c1c5119b03285e3f64bd83a8f9dfeec

Cloud Security and the Enterprise

March 29, 2012 Added by:Ben Kepes

We need to ensure that legislation and regulations for cloud services truly reflect the realities of the cloudy world we live in and do not allow for a shotgun approach to compliance that primarily meets the needs of just one powerful interest group...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Is a W-2 Considered PHI Under HIPAA?

March 25, 2012 Added by:Rebecca Herold

The question was framed as meaning the entire W-2 form was being “submitted” for financial assistance to pay for healthcare, so with this in mind, we will consider it as one document containing several information items that are necessarily grouped together...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Transborder Data Flows at Risk

March 22, 2012 Added by:David Navetta

The proliferation of comprehensive data privacy laws, more or less on the European model, increasingly requires US-based multinationals and online companies to adapt to strict requirements for dealing with individuals in other countries...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

A Seat at the Table: Compliance in the Contract Tender Process

March 21, 2012 Added by:Thomas Fox

A mature compliance program can be a great benefit for a company, not only in evaluating risk from the compliance perspective but also preparing the necessary steps so that if a contact is awarded, it can be executed in an efficient manner. But it must have a seat at the table...

Comments  (0)

296634767383f056e82787fcb3b94864

Commerce Secretary Bryson Doesn't Understand Cyber Espionage

March 15, 2012 Added by:Jeffrey Carr

The U.S. will only begin to save its intellectual property from cyber thieves when corporate boards of directors force CEOs to inventory, segregate and monitor their critical data in real time which usually means re-architecting their entire network...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

NTIA Requests Comments on New Privacy Framework

March 14, 2012 Added by:David Navetta

The NTIA seeks comments to begin development of the consumer data collection code of conduct among a broad spectrum of stakeholders in which companies will voluntarily participate, but which will also be legally enforceable and subject to the jurisdiction of the FTC...

Comments  (8)

59d9b46aa00c70238bb89056cfeb96c0

Improving Compliance Performance in Your Supply Chain

March 05, 2012 Added by:Thomas Fox

One of the areas moving towards being incorporated into compliance programs is the supply chain. While many companies have focused significant compliance efforts towards the sales chain, the supply chain is now viewed as an area which requires compliance scrutiny...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »