The National Labor Relations Board (NLRB) has continued its assault on businesses and their ability to legitimately protect their computer systems and information against unauthorized non-business use by employees. A few weeks ago, I wrote 3 Important Points on Computer Policies in which I stressed (1) why your company must have them but (2) that … Continue reading Computer Use Policies – Are Your Company’s Illegal According to the NLRB?
IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today's businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are … Continue reading 3 Important Points on Computer Use Policies
An article in eCommerce Times offers a well-reasoned argument for why the NIST (National Institute of Standards and Technology) Cybersecurity Framework is the guiding force in shaping the United States' federal cybersecurity strategy: NIST Risk-Assessment Framework Shapes Federal Cybersecurity Strategy You should read it -- but only after you read the following explanation because it is … Continue reading The #1 Reason NIST Cybersecurity Framework is Becoming the Standard
In his latest Ethical Boardroom article, Shawn Tuma explains why it is important for board members to have an active role in their company's cybersecurity preparation and tells them several key steps they can take to do so. Tuma also explains why cybersecurity is as much a legal issue and business issue as it is … Continue reading Managing Cybersecurity Risks for Boards of Directors
Do not miss this podcast discussing key cybersecurity legal events from 2015. Shawn Tuma joined the DtSR Gang [Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst)] on the Down the Security Rabbit Hole podcast. In this episode... Most important cybersecurity-related legal developments of 2015 Tectonic Shift that occurred with “standing” in consumer data … Continue reading Cybersecurity Legal Year in Review – #DtSR Podcast