Items Tagged with "Regulation"


959779642e6e758563e80b5d83150a9f

Ultimate Breach of Patient Privacy: Real-Time Death on Video

August 29, 2012 Added by:Danny Lieberman

As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

TPP: Don’t Let Them Trade Away Internet Freedom

August 28, 2012 Added by:Electronic Frontier Foundation

The intellectual property (IP) chapter would have negative ramifications for freedom and innovation and second, the process has shut out multi-stakeholder participation and is shrouded in secrecy. The TPP is a threat because it rewrites global rules on IP enforcement and restrict the public domain...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Seeks Comment on Proposed Revisions to COPPA Rule

August 27, 2012 Added by:David Navetta

The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...

Comments  (2)

Bd07d58f0d31d48d3764821d109bf165

Compliance is Not Always a Four-Letter Word

August 22, 2012 Added by:Tripwire Inc

This typical reaction I get in the US is many organizations see compliance as a “tax” and try to get away with doing the bare minimum. How do you and your organizations view compliance? Do you see it as a four-letter word, a nuisance, or as a step along the path to more effective security?

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Illinois Bars Employers from Obtaining Social Media Credentials

August 20, 2012 Added by:David Navetta

Although privacy advocates and federal regulators and legislators have primarily been focusing on consumer privacy issues, such as behavioral advertising and data mining, the significant changes in workplace privacy protections demand continued vigilance from employers...

Comments  (1)

924ce315203c17e05d9e04b59648a942

Cyber Arms Deals and Latin America in the Post-Stuxnet World

August 15, 2012 Added by:Richard Stiennon

The trade of conventional weapons is a multi-billion dollar industry. But when it comes to cyber weapons, developed nations have yet to place limits on what kind of offensive software can be sold. It becomes a necessity to begin some kind of international regulatory system for cyber weapons and the prerequisite expertise...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

New Cybersecurity Bill Patches Serious Vulnerabilities

July 24, 2012 Added by:Electronic Frontier Foundation

We remain unpersuaded that any of the proposed cybersecurity measures are necessary and we still have concerns about certain sections of the bill, especially the sections on monitoring and countermeasures. But this was a big step in the direction of protecting online rights...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Latest Data Breach Notification Bill Won’t Go Far

July 23, 2012 Added by:Kelly Colgan

When comparing the bill to existing state laws on the subject, the lack of focus on consumer protection and an emphasis on making it business-friendly become evident. It becomes evident not by looking at what the bill contains, but by looking at what is purposely missing...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

No Data Retention Mandate in Smith’s New Legislation

July 12, 2012 Added by:Electronic Frontier Foundation

A controversial, anti-privacy data retention mandate is notably absent from the child protection bill recently introduced by Rep. Lamar Smith. Smith had previously introduced H.R. 1981, which would have mandated that ISPs collect and maintain data on Internet users not suspected of any crime...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Netherlands to Establish Mandatory Breach Notification

July 11, 2012 Added by:Matthijs R. Koot

In 2012, Netherlands will establish mandatory breach notification for vital sectors, giving the government increasing sectoral intervention possibilities. This includes the authority to obtain information, administrative enforcement of designations and the authority to appoint an officer on behalf of the government...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Internet Users Again Shut Out of Secret TPP Negotiations

July 05, 2012 Added by:Electronic Frontier Foundation

We don’t know what’s in the current version of the TPP’s IP chapter - the public has only seen a leaked version. Given what we've seen in this leak, we have every right to be furious that representatives are negotiating an agreement that will harm online expression, privacy, and innovation on the Internet...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Time for Congress to Pledge to Uphold Internet Freedom

July 03, 2012 Added by:Electronic Frontier Foundation

Congress has attempted to legislate in favor of corporations and law enforcement at the expense of its users’ basic rights. Netizens’ strong desire to keep the Internet open and free has been brushed aside as naïve and inconsequential, in favor of lobbyists and special interest groups. Well, no longer...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Lack of Basic Security Practices Results in $1.7 Million Sanction

July 02, 2012 Added by:Rebecca Herold

“This is OCR’s first HIPAA action against a state agency and we expect organizations to comply with their obligations under these rules regardless of whether they are private or public entities.” Bottom line for all organizations of all sizes: It is wise to learn from the pain of others...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Two Northeast States Updated Breach Notification Statutes

June 27, 2012 Added by:David Navetta

Much time and ink has been spent on the steady stream of data security and breach-related bills that spring up in Congress like mushrooms after a rain. But recently Vermont and Connecticut updated their existing breach notification statutes, highlighting the need to monitor state legislatures...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

International Coalition Issues Cybersecurity Policy Principles

June 26, 2012

"Policymakers are keenly focused on the development of smart, effective, robust cyber defenses... The tech sector wants to ensure that the digital world’s foundation of openness and collaboration is not lost to a well-intentioned but poorly constructed international patchwork of cyber defenses"...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Contracts and Infosec Part 3: Processing and Data Disposal

June 21, 2012 Added by:Bill Gerneglia

The parties should also stipulate their expectations for data return or destruction upon termination of an NDA. The expectations for data return or destruction will be typically molded by a party’s desire to keep compliant with the particular data handling law or regulation to which the party is subject...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »