Blogs

Showing Blog Posts: 21–30 of 73 tagged Compliance

  • California’s New “Eraser” Privacy Law Aimed at Protecting Minors

    by Stephen Wu on September 29, 2013

    On September 23, 2013, Governor Jerry Brown signed a new piece of legislation aimed at the online protection of minors. Designated Senate Bill 568, the new law received publicity for giving minors an “Internet eraser,” requiring online services to provide a mechanism by which minors can remove their own social media and other online content. This mechanism is intended to give minors the ability…

  • SCADA and Me

    by Ben Rothke on September 12, 2013

    When is the right time to talk to your kids about SCADA? According to the new book SCADA and Me, the time is now. The book bills itself as a book for children and management. Truth be told, that is a hard, if not impossible combination to write for. The reality is that SCADA is not child’s play. The underlying theme of the book is that SCADA is critical to our national infrastructure and that it’s…

  • The Perils of Audits

    by Gib Sorebo on August 31, 2013

    Among critical infrastructure asset owners, a common device for ensuring that their cybersecurity risk posture is appropriate is an audit. We'll leave aside whether the motivation is compliance or simply a desire to be as secure as possible against attacks. In essence, both motivations often lead to the disaster that is the audit whether it is driven by "best practices" or a particular compliance…

  • Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

    by Ben Rothke on July 10, 2013

    Every organization has external software, hardware and 3 rd -party vendors they have to deal with. In many cases, these vendors will have direct access to the corporate networks, confidential and proprietary data and more. Often the software and hardware solutions are critical to the infrastructure and security of the organization. If the vendors don’t have effective information security and…

  • Legal Issues in Managing Mobile Devices in the Enterprise

    by Stephen Wu on May 17, 2013

    This month, I completed a book on the legal issues involved with managing mobile devices in the enterprise. The publisher will be the American Bar Association Section of Science & Technology Law. I served as Chair of the Section from 2010 to 2011. I expect the Section to publish the book in time for the American Bar Association Annual Meeting in August in San Francisco. But the purpose of this…

  • Managing Risk and Information Security: Protect to Enable

    by Ben Rothke on March 20, 2013

    Risk management in the real world is not an easy endeavor. On one side, people use toilet seat covers thinking they do something, on the other side, millions of people smoke cigarettes, ignoring the empirical evidence of their danger. In Managing Risk and Information Security: Protect to Enable, author Malcolm Harkins deals with the inherent tension of information security – that between…

  • California Legislation Adds New Employer Records Management Requirements

    by Stephen Wu on January 13, 2013

    California companies must keep track of records and information management (RIM) requirements for the generation, retention, and disclosure of various records. It is difficult to keep track of all of them. Consequently, it makes sense to devote resources, whether internal or an external consulting firm, to match requirements to the types of records that they use. Last year, a trio of new pieces…

  • New Illinois Social Media Privacy Law

    by Stephen Wu on November 12, 2012

    On January 1, 2013, new Illinois legislation will go into effect, which will limit employers' ability to gain access to employees' or job candidates' social media content. The legislation, HB3782, bars employers from requesting or requiring any employee or prospective employee to provide a password or related social networking account information. After news reports early this year talked about…

  • PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance - 3rd edition

    by Ben Rothke on October 22, 2012

    PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance is now out in its 3 rd edition. My review of the 2 nd edition is here. While much of PCI has pretty much stayed the same; in the two years since the 2 nd edition came out, the PCI DSS standard itself has moved from version 1.2 to 2.0. Like the other editions of the book, it provides a comprehensive and clear…

  • New California Social Media Privacy Legislation

    by Stephen Wu on October 8, 2012

    On September 27, 2012, California Governor Jerry Brown signed two pieces of legislation intended to protect the privacy of social media accounts. The first, AB 1844, covers employees, and the second, SB 1349, covers students at postsecondary educational institutions. I wrote an earlier post about how some employers are demanding that employment applicants give them their Facebook user names and…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 31 Aug 2014 06:14:31 -0400.
© 2014 EMC Corporation. All rights reserved.