Blogs

Showing Blog Posts: 41–50 of 79 tagged Compliance

  • Social Media Privacy Legislation Update

    by Stephen Wu on May 30, 2012

    Back in March, I wrote about new legislation at the state level that would prohibit employers from asking job applicants for their social media user names and passwords. Legislatures in eleven states have introduced social media privacy bills, and in one state, Maryland, one of the bills has become law. The idea behind these laws is that when employers demand that a job applicant disclose his or…

  • First Criminal Case in BP Oil Spill Based on Spoliation

    by Stephen Wu on April 25, 2012

    Yesterday, the first criminal charges in the BP oil spill disaster were unveiled, as the government arrested and charged BP engineer Kurt Mix with obstruction of justice. What was the crime charged? The government charged Mix with obstruction of justice based on Mix allegedly deleting text messages from his iPhone. In other words, the first criminal case in the BP disaster had to do with…

  • New Legislation Would Bar Employers From Asking for Social Media Passwords

    by Stephen Wu on March 24, 2012

    We have all seen stories about how social media accounts are treasure troves of information. In past years, legal experts have discussed the issue of whether employers should view social media information of prospective employees. Some employers are tempted by the amount of information available on these services to vet employees and obtain a much more candid view of what makes job applicants…

  • Senate Bill Promises to Bolster Critical Infrastructure Protection

    by Stephen Wu on February 20, 2012

    Yes, yes, we’ve heard a lot about critical infrastructure protection, its importance to the nation’s security, and preventing a “Digital Pearl Harbor.” We need more information sharing between the public sector and the private sector, the analysts say. We also need more information sharing among private companies, hopefully without creating various kinds of liability—all for the sake of…

  • The Tangled Web: A Guide to Securing Modern Web Applications

    by Ben Rothke on January 25, 2012

    In the classic poem Inferno, Dante passes through the gates of Hell, which has the inscriptionabandon all hope, ye who enter here above the entrance. After reading The Tangled Web: A Guide to Securing Modern Web Applications, one gets the feeling the writing secure web code is akin to Dante’s experience. In this incredibly good and highly technical book, author Michal Zalewski writes that modern…

  • The Legal Profession – Still Catching Up with the New Reality

    by Stephen Wu on December 8, 2011

    eDiscovery rules, the law of spoliation, and evidence law now address electronically stored information (ESI). Courts and some commentators are now talking about the effect of the Internet, social networking, and cloud computing on eDiscovery and evidence law. Thus, the law is starting to catch up with the new reality of computers and the Internet. But is the legal profession catching up with this…

  • California Beefs Up Its Breach Notification Law

    by Stephen Wu on September 28, 2011

    Although we have an old cliché that says, “third time is the charm,” in the case of changing California’s breach notification law, State Senator Joe Simitian required four attempts to see the passage of his bill amending the law. On August 31, 2011, Governor Jerry Brown signed Senate Bill No. 24, a bill to enhance California’s breach notification law, S.B. 1386 from 2003. Former Governor Arnold…

  • Another Reason to Have a Security Policy – Your Customer Demands It

    by Stephen Wu on August 25, 2011

    I am always interested to see the dialogue on the listserv of the Information Security Committee (ISC) of the American Bar Association Section of Science & Technology Law. As a former Co-Chair of the ISC and Immediate Past Chair of the Section, I like to see people sharing ideas, tips, and useful documents, such as forms and checklists, that help people do their jobs. One of the recent posts on the…

  • Apple’s iCloud Will Change How We Do eDiscovery

    by Stephen Wu on July 4, 2011

    In June 2011, Apple unveiled its new iCloud service, with the company promoting the next step in moving away from PC-based computing towards a cloud-centric model of computing. Apple’s iCloud service syncs data among devices, supports automatic data backup, and support third party applications which, over time, will presumably permit a wide range of data uses and sharing. Apple’s new service…

  • Is the oil industry due for a little cyber security attention?

    by Gib Sorebo on June 1, 2010

    The legal profession is often seen as having the rather dubious distinction of seeking to profit at the misfortunes of others or, more simply, of being ambulance chasers. As law graduate myself, I don’t dispute that many practicing lawyers get rather aggressive around accident sites. Nonetheless, much of the profession’s bad name derives instead from the highly valuable function they perform, …

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 28 Nov 2014 03:29:44 -0500.
© 2014 EMC Corporation. All rights reserved.