(Part 2 of 2) A few days ago I posted Guarding Against the Inside Job which was the first half of this thought — today’s post is part 2 — the fun one: Idiocy! Many of you already know that this name resembles that of one of my favorite movies. Need a hint? Idiocy Yep, Idiocy …
Category Archives: Data Breach
Guarding Against the Inside Job (Part 1 of 2)
“You are only as strong as your weakest link” It is becoming clear that the weakest link in most companies’ information security defenses is the people who work inside the company. The company must identify the most likely risks those people face, train them to minimize those risks, develop policies to protect against those risks, …
Continue reading “Guarding Against the Inside Job (Part 1 of 2)”
Key Points of New California Data Breach Law – A Model for Others?
California’s prior data breach law was the first in the nation and turned out to be a model that other states used for their own data breach laws. Whether the new law will have that same effect remains to be seen but, just in case, here is the 30,000 feet view of what it does: …
Continue reading “Key Points of New California Data Breach Law – A Model for Others?”
Minimizing the risk of employee data breach and privacy mischief in the cloud
Employees can get into quite a bit of mischief when they have access to the company’s data — especially disgruntled employees, as we saw in yesterday’s blog Computer Fraud and Abuse Act – great tool for taming an employee that’s gone off the deep end!. The mischief they can get into is increased exponentially with the ease …
Continue reading “Minimizing the risk of employee data breach and privacy mischief in the cloud”
Computer Fraud and Abuse Act – great tool for taming an employee that’s gone off the deep end!
Today I read a case that has a fascinatingly spiteful set of facts and provides a great example of how an employer can use the Computer Fraud in Abuse Act to get an injunction and put a stop to the mischief caused by an employee that is gone off the deep end. I have read …
The legal influence of today’s CIO
In today’s companies the sphere of influence of CIOs is dramatically increasing vis-a-vis other C-Suite executives. This point was nicely made in a blog I read earlier this morning entitled CIO’s Seven Points of Key Influences that was written by Pearl Zhu. I believe that influence is even broader and also includes influence over legal …
Data Breach – Who’s Gonna Get It?
The message–that’s what I’m talking about–who’s gonna get the message first? Data breaches, hacking, and privacy are one of the biggest news stories for 2011 and we are just just barely through the first half of the year. By now even the most zoned-out among us should have heard of the hacking that led to …
Privacy and Cyber Legislation Pending in the 112th Congress
Computer hacking, data breach, data privacy, and information security have dominated the news lately and created a sense of urgency in Congress to “do something” to fix the problems. Over the last few days I have searched the web for a source to keep me updated on all of the cyber-legislation that is currently pending …
Continue reading “Privacy and Cyber Legislation Pending in the 112th Congress”

You must be logged in to post a comment.