Blogs

Showing Blog Posts: 11–20 of 53 tagged Privacy

  • Why Have a Privacy Policy

    by Stephen Wu on August 28, 2013

    Privacy has been a hot legal issue for years, and the temperature is moving even higher. Governmental enforcement actions and class action suits have become ever more common. One common trigger is a data privacy or security breach. Surprisingly, in 2013, another common trigger is the lack of a privacy policy. Yes, there are some companies that create online services or Internet applications…

  • Update on BYOD and Mobile Device Management Book

    by Stephen Wu on June 22, 2013

    Last month, I wrote about the Mobile Transformation, the consumerization of information technology, and managing mobile devices in the enterprise. I gave a sneak preview of my upcoming book on managing mobile devices in the enterprise. I just finished reviewing the page proofs for the book. Accordingly, the book is on track for the publisher, the American Bar Association Section of Science …

  • California's New Defense for Medical Data Breach Cases

    by Stephen Wu on February 24, 2013

    Last year, I discussed the phenomenon of a big dollar class action suit seeking almost a billion dollars in statutory damages arising out of a healthcare data breach.#_ftn1 A break-in at Sutter Health occurred at its administrative offices in October 2011, in which burglars stole a desktop computer containing unencrypted electronic medical records on a large number of patients. On the date Sutter…

  • A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology

    by Ben Rothke on January 21, 2013

    In the 4th edition of A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology, author Sara Baase takes a broad look at the social, legal and ethical issues around technology and their implications. Baase notes that her primary goal in writing the book is for computer professionals to understand the implications of what they create and how it fits into society. The book is an…

  • Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

    by Ben Rothke on January 8, 2013

    I was flattered when John Trinckes asked me to write the forward to Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules, given the importance of the topic. There are plenty of books on HIPAA going back a number of years. But there is a death of books on HITECH. For the uninitiated, HITECH is the Health Information Technology for Economic and Clinical Healthact, which was…

  • BYOD and Employee Privacy--Factors to Consider

    by Stephen Wu on December 12, 2012

    Let’s say that your company has a “Bring Your Own Device” (BYOD) policy permitting employees to use personal mobile devices for work. Do your employees have a reasonable expectation that their mobile device information is private, even if some of that information is work-related? Can an employer compel access to that information? A recent case sheds some light on the factors a court will use to…

  • New Illinois Social Media Privacy Law

    by Stephen Wu on November 12, 2012

    On January 1, 2013, new Illinois legislation will go into effect, which will limit employers' ability to gain access to employees' or job candidates' social media content. The legislation, HB3782, bars employers from requesting or requiring any employee or prospective employee to provide a password or related social networking account information. After news reports early this year talked about…

  • New California Social Media Privacy Legislation

    by Stephen Wu on October 8, 2012

    On September 27, 2012, California Governor Jerry Brown signed two pieces of legislation intended to protect the privacy of social media accounts. The first, AB 1844, covers employees, and the second, SB 1349, covers students at postsecondary educational institutions. I wrote an earlier post about how some employers are demanding that employment applicants give them their Facebook user names and…

  • Best Practices for the Destruction of Digital Data

    by Ben Rothke on August 15, 2012

    It is often said that nothing is as simple as it seems. Take for instance deleting data on your storage device. For most people, all they think they need to do is delete the file. How mistaken they are. As my friend Ryk Edelstein and his co-author Dr. Gordon Hughes detail in Best Practices for the Destruction of Digital Data, it is often not that simple. The authors write that the ability to…

  • Navigating Social Media Legal Risks: Safeguarding Your Business

    by Ben Rothke on August 14, 2012

    In the documentary Scared Straight! a group of inmates terrify young offenders in an attempt to “scare them straight”" (hence the film's title) so that those teenagers will avoid prison life. A 2002 meta-analysis of the results of a number of scared straight and similar intervention programs found that they actively increased crime rates, leading to higher re-offense rates than in control groups…

This document was retrieved from http://www.rsaconference.com/blogs on Fri, 22 Aug 2014 07:46:35 -0400.
© 2014 EMC Corporation. All rights reserved.