Privacy and security has become a major focus of the Department of Commerce. The Department’s Internet Policy Task Force has issued its second green paper, this one proposing the creation of nationally recognized voluntary codes of conduct to help strengthen cybersecurity. Comments will be accepted on “Cybersecurity, Innovation and the Internet Economy” through August 1, 2011…. Continue Reading
Tag Archives: Information Security
Restaurant Chain Settles FTC Data Breach Charges
Posted in Data BreachYesterday, the Federal Trade Commission (“FTC”) weighed in with another proposed settlement agreement requiring that the Dave & Buster’s restaurant chain that experienced a massive data breach in 2007 establish and maintain a comprehensive information security program as a condition of settling a consumer protection action arising out of that data breach. This is the… Continue Reading
Holiday Privacy Watch: Take care before you donate that cell phone
Posted in Data Breach, Data Compliance & SecurityDuring the holiday season, many organizations are soliciting donations of old cell phones to be repurposed. This is an excellent way to “reuse, reduce, and recycle” and puts those useless (to you) items to use in a positive way, but please remember — important and private data reside in your cell phone’s internal memory, even… Continue Reading
Privacy and Security Bits and Bytes
Posted in Data Compliance & SecurityComing back from vacation and catching up on what’s been going on …. In case you are looking for something security-related to do in the month of August — check out the Internet Security Alliance Calendar of Events According to an InternetNews.com article, cookies may be back on the menu for U.S. Government web sites…. Continue Reading
Security Bits and Bytes
Posted in Data BreachThe Wall Street Journal reports that the CEO of Heartland Payment Systems “gets religion” on security. You’ll recall that Heartland reported what has been called the “largest security breach ever” earlier in the year. Researchers have uncovered a new platform used by cybercriminals to buy and sell batches of zombie PCs and other tools used… Continue Reading
FTC Issues Consent Order for GLBA Violations
Posted in LegislationIn the run-up to the enforcement deadline for the Identity Theft Red Flag Rule (August 1, 2009 – more on that in another post), enforcement of the Gramm-Leach-Bliley Privacy Rule and Safeguards Rule has not been forgotten by the Federal Trade Commission. This week, the FTC issued a consent order against mortgage lender James B…. Continue Reading