Blogs

Showing Blog Posts: 11–20 of 56 tagged Privacy

  • Ally's Picks - #SecurityChat on #Privacy

    by Ally Lorentson Dunn on September 30, 2013

    We recently hosted a Twitter chat with security experts on a handful of hot topics around online privacy. One of the questions we asked was, “Who should define expectations for data privacy?” Dejan Kosutic: Organizations must define which information they consider private through classification process. Government should set the standards for privacy of individuals through personal data…

  • California’s New “Eraser” Privacy Law Aimed at Protecting Minors

    by Stephen Wu on September 29, 2013

    On September 23, 2013, Governor Jerry Brown signed a new piece of legislation aimed at the online protection of minors. Designated Senate Bill 568, the new law received publicity for giving minors an “Internet eraser,” requiring online services to provide a mechanism by which minors can remove their own social media and other online content. This mechanism is intended to give minors the ability…

  • Practical Anonymity: Hiding in Plain Sight Online

    by Ben Rothke on August 29, 2013

    With that news that the NSA is monitoring much of the traffic on the Internet, many people are looking to go below the radar. In Practical Anonymity: Hiding in Plain Sight Online, author Peter Loshin shows how to make anonymous use of the Internet. Much of this brief book (130 pages) is on the use of tools such as Tor and Tails. Looks to be interesting. Full review to follow. ISBN 978-0124104044

  • Why Have a Privacy Policy

    by Stephen Wu on August 28, 2013

    Privacy has been a hot legal issue for years, and the temperature is moving even higher. Governmental enforcement actions and class action suits have become ever more common. One common trigger is a data privacy or security breach. Surprisingly, in 2013, another common trigger is the lack of a privacy policy. Yes, there are some companies that create online services or Internet applications…

  • Update on BYOD and Mobile Device Management Book

    by Stephen Wu on June 22, 2013

    Last month, I wrote about the Mobile Transformation, the consumerization of information technology, and managing mobile devices in the enterprise. I gave a sneak preview of my upcoming book on managing mobile devices in the enterprise. I just finished reviewing the page proofs for the book. Accordingly, the book is on track for the publisher, the American Bar Association Section of Science …

  • California's New Defense for Medical Data Breach Cases

    by Stephen Wu on February 24, 2013

    Last year, I discussed the phenomenon of a big dollar class action suit seeking almost a billion dollars in statutory damages arising out of a healthcare data breach.#_ftn1 A break-in at Sutter Health occurred at its administrative offices in October 2011, in which burglars stole a desktop computer containing unencrypted electronic medical records on a large number of patients. On the date Sutter…

  • A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology

    by Ben Rothke on January 21, 2013

    In the 4th edition of A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology, author Sara Baase takes a broad look at the social, legal and ethical issues around technology and their implications. Baase notes that her primary goal in writing the book is for computer professionals to understand the implications of what they create and how it fits into society. The book is an…

  • Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

    by Ben Rothke on January 8, 2013

    I was flattered when John Trinckes asked me to write the forward to Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules, given the importance of the topic. There are plenty of books on HIPAA going back a number of years. But there is a death of books on HITECH. For the uninitiated, HITECH is the Health Information Technology for Economic and Clinical Healthact, which was…

  • BYOD and Employee Privacy--Factors to Consider

    by Stephen Wu on December 12, 2012

    Let’s say that your company has a “Bring Your Own Device” (BYOD) policy permitting employees to use personal mobile devices for work. Do your employees have a reasonable expectation that their mobile device information is private, even if some of that information is work-related? Can an employer compel access to that information? A recent case sheds some light on the factors a court will use to…

  • New Illinois Social Media Privacy Law

    by Stephen Wu on November 12, 2012

    On January 1, 2013, new Illinois legislation will go into effect, which will limit employers' ability to gain access to employees' or job candidates' social media content. The legislation, HB3782, bars employers from requesting or requiring any employee or prospective employee to provide a password or related social networking account information. After news reports early this year talked about…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 23 Oct 2014 07:41:24 -0400.
© 2014 EMC Corporation. All rights reserved.