Blogs

Showing Blog Posts: 61–70 of 76 tagged Compliance

  • The Next NERC CIP

    by Gib Sorebo on December 14, 2009

    Last week I attended a North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection Conference in Atlanta hosted by Electric Utility Consultants, Inc. (EUCI). The presentations were enlightening, particularly one that focused on the next version of the NERC’s Critical Infrastructure Protection (CIP) standards. As I noted in my first post, debates continue to rage about…

  • Google Chrome OS Foreshadows Complete eDiscovery Overhaul

    by Stephen Wu on November 23, 2009

    Last week, Google hosted a press event to answer questions about the upcoming rollout of Google Chrome OS. We've heard rumblings about the supposed Microsoft-supplanting technology for years -- a browser-based OS, "your browser is your operating system," "the web browser is the most important program on your computer," use web apps instead of (Microsoft) boxed or pre-loaded locally-operating…

  • Massachusetts Issues Final Data Security Regulations

    by Stephen Wu on November 6, 2009

    On November 4, 2009, the Massachusetts Office of Consumer Affairs and Business Regulations announced that it promulgated final data security regulations to take effect on March 1, 2009. In a previous blog post, I described imminent changes to the regulations and some of the history of the Massachusetts regulations. The final regulations appear at Title 201 of the Code of Massachusetts Regulations, …

  • Alaska Data Protection Law

    by Stephen Wu on August 26, 2009

    This is another in our series of articles about data protection laws around the country. The focus for this post is on Alaska. On June 19, 2008, Alaska became the 44 th state with a breach notification law when then-Governor Sarah Palin signed HB 65, the Alaska Personal Information Protection Act (“Alaska Act”). Most of the Alaska Act became effective on July 1, 2009. The Alaska Act contains a…

  • Connecticut Data Protection Law

    by Stephen Wu on July 22, 2009

    As part of our ongoing efforts to keep you up-to-date concerning information security legislation around the country, this post covers a fairly recent Connecticut law of interest to information security professionals, executives, risk managers, and attorneys. Connecticut enacted a new data protection law that became effective October 31, 2008. It includes both protection of Social Security…

  • New California Electronic Discovery Act

    by Stephen Wu on July 3, 2009

    On June 29, 2009, Governor Arnold Schwarzenegger signed into law Assembly Bill 5, which enacts California's new Electronic Discovery Act. The new legislation's provisions are similar to the ediscovery rules in the Federal Rules of Civil Procedure, but are not identical to the Federal Rules. Some of the highlights are as follows. The rules allow the discovery of electronically stored information…

  • California Health Care Data Protection Law Addresses Worker Snooping

    by Stephen Wu on April 12, 2009

    Last year, Governor Arnold Schwarzenegger signed into law new data protection laws to prevent health care workers from peeking at celebrities’ medical records, although the legislation strikes at lax data protection practices generally. The scope of the security breaches at the UCLA Medical Center is impressive in terms of the number of people involved, the number of records viewed, and the long…

  • Why the CSO/CISO Should Care About eDiscovery Part -7-

    by Stephen Wu on January 21, 2009

    Part -7- The Federal Rules of Evidence The Federal Rules of Evidence (FRE) provide a Court with rules about whether and upon what circumstances evidence may be considered admissible at trial. These rules were written in the era of the non-electronic, paper-and-ink, or physical evidence world, at a time when when paper records were the norm, and when such paper records constituted the most…

  • Why the CSO/CISO Should Care About eDiscovery Part -5-

    by Stephen Wu on November 13, 2008

    Part -5- eDiscovery Leads to Digital Evidence The path to enhanced CISO understanding of the importance (to the enterprise) of rock solid digital evidence generation must first traverse the twists and turns fo the electronic discovery process. The pathway through eDiscovery may best be described though what is called the Extended Electronic Discovery Reference Model (EEDRM). The model is extended…

  • A New Administration Will Bring New Cybersecurity Regulatory Challenges

    by Stephen Wu on November 5, 2008

    America awoke this morning to a new President-Elect, Barack Obama, who swept to power in an historic election. With the change in administration, our attention as information security professionals naturally turns to the effect of the election on information security regulation and regulatory enforcement. In the past eight years, the Bush administration has neither pushed new information security…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 21 Sep 2014 18:07:56 -0400.
© 2014 EMC Corporation. All rights reserved.