“You are only as strong as your weakest link” It is becoming clear that the weakest link in most companies’ information security defenses is the people who work inside the company. The company must identify the most likely risks those people face, train them to minimize those risks, develop policies to protect against those risks,…
Category: Cybersecurity Law
Key Points of New California Data Breach Law – A Model for Others?
California’s prior data breach law was the first in the nation and turned out to be a model that other states used for their own data breach laws. Whether the new law will have that same effect remains to be seen but, just in case, here is the 30,000 feet view of what it does:…
Minimizing the risk of employee data breach and privacy mischief in the cloud
Employees can get into quite a bit of mischief when they have access to the company’s data — especially disgruntled employees, as we saw in yesterday’s blog Computer Fraud and Abuse Act – great tool for taming an employee that’s gone off the deep end!. The mischief they can get into is increased exponentially with the ease…
Computer Fraud and Abuse Act – great tool for taming an employee that’s gone off the deep end!
Today I read a case that has a fascinatingly spiteful set of facts and provides a great example of how an employer can use the Computer Fraud in Abuse Act to get an injunction and put a stop to the mischief caused by an employee that is gone off the deep end. I have read…
The legal influence of today’s CIO
In today’s companies the sphere of influence of CIOs is dramatically increasing vis-a-vis other C-Suite executives. This point was nicely made in a blog I read earlier this morning entitled CIO’s Seven Points of Key Influences that was written by Pearl Zhu. I believe that influence is even broader and also includes influence over legal…
Data Breach – Who’s Gonna Get It?
The message–that’s what I’m talking about–who’s gonna get the message first? Data breaches, hacking, and privacy are one of the biggest news stories for 2011 and we are just just barely through the first half of the year. By now even the most zoned-out among us should have heard of the hacking that led to…
Privacy and Cyber Legislation Pending in the 112th Congress
Computer hacking, data breach, data privacy, and information security have dominated the news lately and created a sense of urgency in Congress to “do something” to fix the problems. Over the last few days I have searched the web for a source to keep me updated on all of the cyber-legislation that is currently pending…
Personal Data Privacy and Security Act of 2011
On June 7, 2011 Senator Leahy introduced bill S. 1151 in the Senate called the Personal Data Privacy and Security Act of 2011, which is linked HERE. The stated purpose of the bill is as follows: To prevent and mitigate identity theft, to ensure privacy, to provide notice of security breaches, and to enhance criminal…
You must be logged in to post a comment.