Blog Posts Tagged with "Legal"
California AG Releases Mobile App Guidelines; Industry Responds
January 24, 2013 Added by:David Navetta
The guidelines separately address app developers, app platform providers, mobile ad networks, operating system providers, and mobile carriers. A coalition of advertising and marketing industry groups recently responded, criticizing the guidelines...
Comments (1)
Warrantless Surveillance 101: Introducing EFF's New NSA Domestic Spying Guide
December 06, 2012 Added by:Electronic Frontier Foundation
On December 14th, we hope that the Northern District of California federal court will agree with us that our case challenging illegal domestic spying should move forward. Warrantless wiretapping isn't a state secret—it's a clear violation of FISA, other laws, and the Constitution...
Comments (0)
TPP: Why it Matters in the USA
December 04, 2012 Added by:Electronic Frontier Foundation
We live in an interconnected world, and America's actions on the world stage affect us strongly here at home. Take action now to demand that the U.S. government open up the TPP drafts to the public, and that the government negotiate for your interests - not the entertainment companies'...
Comments (0)
Beacon Events Compliance Conference in Beijing – I Wish I Could Be There
November 27, 2012 Added by:Thomas Fox
If you have not had the opportunity to attend a compliance-related conference tailored to the challenges of working in the Far East this would be the one for you. Even if you have attended such an event, this conference focuses on China and will give you insight into how to do business...
Comments (0)
Trading Away our Digital Rights: More Nations Join TPP
November 23, 2012 Added by:Electronic Frontier Foundation
As TPP talks trudge along with ever more Pacific nations participating in the meetings, our alarm over its intellectual property (IP) provisions has only grown. The IP language in this intricate trade agreement would harm users’ digital rights in profound ways, such as pressuring ISPs to become Internet cops...
Comments (0)
Suing our way to Better Security... Redux
November 14, 2012 Added by:Jayson Wylie
One of the latest publicly known Government Data Breaches has incurred yet another lawsuit for the people by the people’s lawyers. Monetary and punitive damages that can be incurred through Personal Identifiable Information (PII) loss resulting in fraud or victimization...
Comments (0)
From Trick or Treat through Thanksgiving: Examining the Past to Prepare for the Future
November 04, 2012 Added by:Mary Shaddock Jones
In my experience, companies need to be closely reviewing what little case law or factual allegations exist with regard to the FCPA so that they too know where to find any potential problems that may exist within their own company. There are only so many ways to hide the dollar...
Comments (0)
Companies Must Consider Travel Providers’ Data Practices or Risk Being Harmed
November 04, 2012 Added by:David Navetta
A company responsible for handling billing and settlement for the International Air Transport Association (IATA) has been selling flight booking information about corporate travelers — on a travel agency level — to airlines, hotels and others...
Comments (0)
Creation, Implementation and Administration of a Hotline
October 29, 2012 Added by:Thomas Fox
I recently saw a White Paper released through Compliance Week, where an un-named author posited that there are seven essential features to create an effective hotline. I found this article to be useful for a compliance practitioner to quickly review how his or her company might set up a hotline...
Comments (0)
Fact Checking Obama's Misleading Answer About Warrantless Wiretapping
October 24, 2012 Added by:Electronic Frontier Foundation
Jon Stewart boldly went where no mainstream reporter has gone: asking President Obama why he embraced Bush’s warrantless wiretapping program after campaigning against it. While Stewart’s question was commendable, Obama’s answer was puzzling because it seems so obviously untrue...
Comments (2)
Employers Must Consider Social Media Risks
October 17, 2012 Added by:David Navetta
One should assume that any information purportedly protected by privacy settings could still be viewed by strangers. And t is difficult to authenticate “friends” on a social network – they may be impersonators looking to scrape sensitive information from the ”private” online posts...
Comments (0)
James Bond at 50 – A Compliance Conversation in English and American
October 15, 2012 Added by:Thomas Fox
Maybe it’s just the difference in the two cultures; in the UK, they are trying figure out how and why compliance failures occurred and change the compliance culture so they can obey the law. In the US, businesses want to change the law so the conduct companies engage in will no longer violate the law...
Comments (0)
EFF Opposes Government's State Secrets Claim in Wiretapping Case
October 14, 2012 Added by:Electronic Frontier Foundation
EFF filed its latest brief in the Jewel v. NSA case, aiming to stop the government from engaging in mass warrantless collection of emails, phone calls, and customer records of ordinary Americans. The matter is set for hearing on December 14, 2012 in federal court in San Francisco...
Comments (0)
Landmark Ruling: Insiders Aren't Hacking if You Gave them Access
October 08, 2012 Added by:Rafal Los
What happens if you go perusing through your corporate file-share lists, applications directories and such... and find some interesting stuff that you aren't technically supposed to have access to yet the controls in place have no problem giving you permission? Does anyone notice?
Comments (0)
CEO Hubris and Compliance Catastrophes
October 08, 2012 Added by:Thomas Fox
Even in this age of documenting, checking, measuring, stress testing and reassessing every conceivable type of risk, what is the one which is never tested? She believes that the answer is “the chief executive gets so high on power that he or she losses the plot...”
Comments (0)
New Book Details the NSA’s Warrantless Wiretapping Program
October 07, 2012 Added by:Electronic Frontier Foundation
Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization