Blogs

Showing Blog Posts: 1–10 of 81 tagged Legal

  • Supply Chain Security: What It Means on a Global Level

    by John Linkous on July 18, 2014

    Take a good, long look at your smartphone. While there is a big vendor name on the outside, if you were to open up its case, you would find several other vendor labels on various components: capacitive touchscreens; video and audio ASICs; Bluetooth and WiFi hardware; and individual capacitors, resistors, and other electronics gear building blocks, to name just a few, all of which are manufactured…

  • The FTC v. Wyndham Decision: A New Era or More of the Same?

    by Gib Sorebo on April 14, 2014

    The recent decision of the Federal Trade Commission v. Wyndham Worldwide Corporation reflected, for the first time, a court’s view on the Federal Trade Commission’s (FTC’s) authority to regulate cybersecurity under the Federal Trade Commission Act. The court concluded that (1) the FTC does have the authority to regulate cybersecurity under its authority in Section 5 of the FTC Act to address…

  • New Legislation Addresses Mobile App Privacy in California

    by Stephen Wu on February 27, 2014

    The healthcare field is beginning to hop onto the bandwagon of mobile computing. Mobile computing is spreading to healthcare in a number of ways. The first use case is in diagnostics, in which a doctor or nurse could use a device to monitor health metrics, such as vital signs (whether at hospital stays or simply during a routine check-up), glucose levels for diabetics, sleep data, caloric or…

  • “Keeping Up with the Joneses” May Not Mean Keeping Up With Security

    by Gib Sorebo on February 3, 2014

    As a cybersecurity consultant, I’m often asked by customers how they compare with their peers in the industry. This can vary from requests for simply anecdotal comparisons of products used to a full-fledged benchmarking of their entire cybersecurity program. Either way, it’s clear that aligning practices and spending with peers is important to many, particularly among critical infrastructure…

  • New California Do Not Track Legislation

    by Stephen Wu on February 3, 2014

    Under California’s Online Privacy Protection Act (OPPA) of 2003,[1] California law requires commercial websites or online services that obtain personally identifiable information about California consumers to conspicuously post their privacy policies. “Personally identifiable information” includes a first and last name, address, email address, telephone number, social security number, or any…

  • California’s New “Eraser” Privacy Law Aimed at Protecting Minors

    by Stephen Wu on September 29, 2013

    On September 23, 2013, Governor Jerry Brown signed a new piece of legislation aimed at the online protection of minors. Designated Senate Bill 568, the new law received publicity for giving minors an “Internet eraser,” requiring online services to provide a mechanism by which minors can remove their own social media and other online content. This mechanism is intended to give minors the ability…

  • Why Have a Privacy Policy

    by Stephen Wu on August 28, 2013

    Privacy has been a hot legal issue for years, and the temperature is moving even higher. Governmental enforcement actions and class action suits have become ever more common. One common trigger is a data privacy or security breach. Surprisingly, in 2013, another common trigger is the lack of a privacy policy. Yes, there are some companies that create online services or Internet applications…

  • Update on BYOD and Mobile Device Management Book

    by Stephen Wu on June 22, 2013

    Last month, I wrote about the Mobile Transformation, the consumerization of information technology, and managing mobile devices in the enterprise. I gave a sneak preview of my upcoming book on managing mobile devices in the enterprise. I just finished reviewing the page proofs for the book. Accordingly, the book is on track for the publisher, the American Bar Association Section of Science …

  • Locked Down: Information Security for Lawyers

    by Ben Rothke on May 20, 2013

    Had Locked Down: Information Security for Lawyers not been published by the American Bar Association (ABA) and 2 of its 3 authors not been attorneys; one would have thought the book is a reproach against attorneys for their obliviousness towards information security and privacy. In numerous places, the book notes that lawyers are often clueless when it comes to digital security. With that, the…

  • Legal Issues in Managing Mobile Devices in the Enterprise

    by Stephen Wu on May 17, 2013

    This month, I completed a book on the legal issues involved with managing mobile devices in the enterprise. The publisher will be the American Bar Association Section of Science & Technology Law. I served as Chair of the Section from 2010 to 2011. I expect the Section to publish the book in time for the American Bar Association Annual Meeting in August in San Francisco. But the purpose of this…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 02 Sep 2014 13:40:01 -0400.
© 2014 EMC Corporation. All rights reserved.