Menu

Blogs

Showing Blog Posts: 21–30 of 58 tagged Privacy

  • BYOD and Employee Privacy--Factors to Consider

    by Stephen Wu on December 12, 2012

    Let’s say that your company has a “Bring Your Own Device” (BYOD) policy permitting employees to use personal mobile devices for work. Do your employees have a reasonable expectation that their mobile device information is private, even if some of that information is work-related? Can an employer compel access to that information? A recent case sheds some light on the factors a court will use to…

  • New Illinois Social Media Privacy Law

    by Stephen Wu on November 12, 2012

    On January 1, 2013, new Illinois legislation will go into effect, which will limit employers' ability to gain access to employees' or job candidates' social media content. The legislation, HB3782, bars employers from requesting or requiring any employee or prospective employee to provide a password or related social networking account information. After news reports early this year talked about…

  • New California Social Media Privacy Legislation

    by Stephen Wu on October 8, 2012

    On September 27, 2012, California Governor Jerry Brown signed two pieces of legislation intended to protect the privacy of social media accounts. The first, AB 1844, covers employees, and the second, SB 1349, covers students at postsecondary educational institutions. I wrote an earlier post about how some employers are demanding that employment applicants give them their Facebook user names and…

  • Best Practices for the Destruction of Digital Data

    by Ben Rothke on August 15, 2012

    It is often said that nothing is as simple as it seems. Take for instance deleting data on your storage device. For most people, all they think they need to do is delete the file. How mistaken they are. As my friend Ryk Edelstein and his co-author Dr. Gordon Hughes detail in Best Practices for the Destruction of Digital Data, it is often not that simple. The authors write that the ability to…

  • Navigating Social Media Legal Risks: Safeguarding Your Business

    by Ben Rothke on August 14, 2012

    In the documentary Scared Straight! a group of inmates terrify young offenders in an attempt to “scare them straight”" (hence the film's title) so that those teenagers will avoid prison life. A 2002 meta-analysis of the results of a number of scared straight and similar intervention programs found that they actively increased crime rates, leading to higher re-offense rates than in control groups…

  • Preview - Reverse Deception Organized Cyber Threat Counter-Exploitation

    by Ben Rothke on July 18, 2012

    When the Yankee Doodle virus first appeared in 1989, all it could do was play the song of the same name. It was annoying, not in the least bit stealthy and begged to be identified. Jump to current times and the song has not remained the same. Today's attacks are extremely stealthy and equally nefarious. The notion of advanced persistent threats (APT) is such that nation states target a specific…

  • Preview - Navigating Social Media Legal Risks: Safeguarding Your Business

    by Ben Rothke on July 11, 2012

    I received a copy of Navigating Social Media Legal Risks: Safeguarding Your Business last week and only had time to start and read the first chapter. The first chapter deals with contests and sweepstakes; and no, they are not synonymous. A few days later, I got the following invite on Facebook: Suffice to say, that giveaway is neither a contest nor sweepstakes, rather a scam. By knowing how to…

  • Network Forensics: Tracking Hackers through Cyberspace

    by Ben Rothke on June 28, 2012

    With a title like Network Forensics: Tracking Hackers through Cyberspace, the book at first sounds like a cheesy novel. But by page 25, you will quickly see this is the real thing. By the time you hit the last page, you will have read the collective wisdom of two of the smartest minds in the space. Author’s Jonathan Ham and Sherri Davidoff are both SANS Institute instructors, and bring significant…

  • Ally's Picks - Hugh Thompson's Crystal Ball

    by Ally Lorentson Dunn on June 19, 2012

    Crystal Ball: Reflections from RSA Conference 2012 and Looking at the Year Ahead How do shark attacks in Egypt and learning how to drive relate to the themes seen at this year's conference? Leave it to Hugh to combine brilliant insights and pop culture references to create an entertaining take on the big themes from this past conference and what we may see next year. Last year, in this same…

  • Social Media Privacy Legislation Update

    by Stephen Wu on May 30, 2012

    Back in March, I wrote about new legislation at the state level that would prohibit employers from asking job applicants for their social media user names and passwords. Legislatures in eleven states have introduced social media privacy bills, and in one state, Maryland, one of the bills has become law. The idea behind these laws is that when employers demand that a job applicant disclose his or…

This document was retrieved from http://www.rsaconference.com/blogs on Sun, 21 Dec 2014 22:30:51 -0500.
© 2014 EMC Corporation. All rights reserved.