Blogs

Showing Blog Posts: 91–100 of 101 tagged Data Breach

  • Montana's Amendments to Its Breach Notification Law

    by Stephen Wu on April 7, 2010

    Last April, Montana added a public sector breach notification requirement to its existing private sector breach notification law. Mont. Code Ann. § 30-14-1704. The new law, enacted as H.B. 155, went into effect on October 1, 2009. It applies to “state agencies,” and creates a breach notification requirement for agencies maintaining data containing personal information. For a copy of H.B. 155, …

  • New Information Security Lawsuit -- Why Now?

    by Stephen Wu on February 16, 2010

    Over the years, many have doubted whether we will see substantial, real-dollar information security lawsuits. Some said that companies don't want to be embarrassed by filing suit and having to admit in their complaints that they've been hacked. Others said there's no money in it for potential plaintiffs (and plaintiffs' attorneys). In my opinion, I always thought we'd see plaintiffs filing cases…

  • Summary of Selected Encryption Laws

    by Stephen Wu on January 23, 2010

    This month, I updated a white paper entitled "Summary of Selected Encryption Laws." The white paper will be an appendix in a forthcoming book to be published by the American Bar Association Section of Science and Technology Law on data protection. The white paper summarizes selected encryption-related federal and state statutes, regulations, and regulatory guidance. The original version of this…

  • Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

    by Ben Rothke on January 12, 2010

    Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures explores an important, yet often neglected topic. Even though hacker Kevin Mitnick's notorious exploits are more than a decade old, the media, and even some security professionals, continue to be obsessed with him. In early October 2006 alone, his name came up a few dozen times in a…

  • Massachusetts Issues Final Data Security Regulations

    by Stephen Wu on November 6, 2009

    On November 4, 2009, the Massachusetts Office of Consumer Affairs and Business Regulations announced that it promulgated final data security regulations to take effect on March 1, 2009. In a previous blog post, I described imminent changes to the regulations and some of the history of the Massachusetts regulations. The final regulations appear at Title 201 of the Code of Massachusetts Regulations, …

  • Connecticut Data Protection Law

    by Stephen Wu on July 22, 2009

    As part of our ongoing efforts to keep you up-to-date concerning information security legislation around the country, this post covers a fairly recent Connecticut law of interest to information security professionals, executives, risk managers, and attorneys. Connecticut enacted a new data protection law that became effective October 31, 2008. It includes both protection of Social Security…

  • California Health Care Data Protection Law Addresses Worker Snooping

    by Stephen Wu on April 12, 2009

    Last year, Governor Arnold Schwarzenegger signed into law new data protection laws to prevent health care workers from peeking at celebrities’ medical records, although the legislation strikes at lax data protection practices generally. The scope of the security breaches at the UCLA Medical Center is impressive in terms of the number of people involved, the number of records viewed, and the long…

  • Authentication Requirement for Digital Evidence Admissibility

    by Stephen Wu on November 25, 2008

    The Bankruptcy Court in the Central District of California issued a decision in October following the Vinhnee approach to digital evidence authentication. It bears repeating that in order to have evidence considered by a jury (or a judge, in Bankruptcy court) it must first be authenticated in accordance with Federal Rules of Evidence Rule 901. The Bankruptcy Court in In re Vargas, --- B.R---, …

  • A New Administration Will Bring New Cybersecurity Regulatory Challenges

    by Stephen Wu on November 5, 2008

    America awoke this morning to a new President-Elect, Barack Obama, who swept to power in an historic election. With the change in administration, our attention as information security professionals naturally turns to the effect of the election on information security regulation and regulatory enforcement. In the past eight years, the Bush administration has neither pushed new information security…

  • Why the CSO/CISO Should Care About eDiscovery Part -3-

    by Stephen Wu on October 25, 2008

    Part -3- The Evolving Landscape of eDiscovery There are three forces that are having an increasingly important influence in the ongoing evolution of eDiscovery processes. The first is the overwhelming predominance of corporate information generated and stored electronically. The second force is the December 2006 amendments to the Federal Rules of Civil Procedure (FRCP) which for the first time in…

This document was retrieved from http://www.rsaconference.com/blogs on Mon, 01 Sep 2014 19:30:43 -0400.
© 2014 EMC Corporation. All rights reserved.