All Data Privacy articles – Page 41
-
Article
Calls for More Data Sharing to Step Up Terrorism Fight
Washington wants Corporate America to step up its attention to terrorism risk. That was the message at a recent congressional hearing, the latest instance of voices saying business and government should cooperate to uncover terrorists’ sophisticated financing schemes. “Most of the early warning signs reside with the private sector, and ...
-
Blog
K2 Intelligence Enhances Regulatory Compliance and Cyber Defense Team
K2 Intelligence, an investigative, compliance and cyber-defense services firm, recently appointmented two cyber-security veterans to its compliance and cyber defense team. Dana Syracuse will join the firm on Sept. 10 and Vincent D’Agostino joined on Aug. 31. More inside.
-
Article
More Cyber-Security Guidelines for Govt Contractors
Image: The Obama Administration is considering new cyber-security guidance that would effectively impose stringent new reporting obligations on government contractors. That means more due diligence on third parties, and a review of contract language to see who is responsible for what. “[E]verybody is going to need to get their cyber-house ...
-
Blog
ACC Launches Information Governance Committee
The Association of Corporate Counsel (ACC), a global legal association representing 40,000 in-house counsel in 90 countries, last week announced the launch of a new practice area committee. The ACC Information Governance Committee will foster engagement and collaboration on corporate legal departments’ role in data protection and collection, discovery procedures ...
-
Blog
Accellion Launches Governance Package for Kiteworks
Accellion, a provider of private cloud solutions for secure file sharing and collaboration that ensure data security and compliance, recently announced that it has added new security and governance capabilities to its kiteworks secure content platform. Accellion's kiteworks governance package is designed to assist enterprise organizations in demonstrating compliance with ...
-
Article
CCOs Playing a Stronger Role in Data Privacy Practices
Image: As data privacy laws proliferate, they are creating a web that traps how corporations use personal data in their operations. The challenge for compliance officers: how to play a more strategic role and ensure your business doesn’t get stuck. “The inclusion of the CCO function in defining controls related ...
-
Article
SEC Pushes New Limits on Cyber-Security, Securities Fraud
Another byproduct of life in the cyber-security age: The SEC is redefining insider trading to focus more on improper trading, even if you are a thief mining a company for inside information without actually working there. The misconduct—called, yes, “outsider trading”—seems to be an SEC-enforceable offense so far, and it ...
-
Article
The Keys to Better Access Control Systems
Image: Gone are the days when “access control” meant locking your door or filing cabinet. Now compliance, IT, and audit teams must collaborate on controls to access networks rather than physical stores of information. Inside, we look at three best practices to design strong access control and at how to ...
-
Blog
New Mimecast Services Extend Spear-Phishing Protection
Mimecast has announced two new measures designed to protect against spear-phishing. The first measure, Attachment Protect, and user awareness enhancements reduce the threat from malware-laden attachments and help IT teams improve employee security awareness. The second measure, Mimecast Targeted Threat Protection – URL Protect, give customers a comprehensive line of ...
-
Article
How to Simplify Cyber-Security Controls Amid Abundant Laws
By now every compliance officer has already heard the warning that it’s a matter of when you suffer a cyber-security breach, not if. Then comes compliance with breach disclosure rules—and those demands are becoming as perplexing as the cyber-threat itself. Overwhelmed, compliance officers are seeking ways to navigate these demands ...
-
Article
Avoiding the Pitfalls of Data Mining
In recent months, numerous companies have found themselves the target of legal and enforcement actions for obtaining or using personal data without consent. The kicker: Most of these actions could have been easily avoided, since most of the infractions were clear violations of contract law. “If companies simply complied with ...
-
Blog
Akerman Launches New Data Law Practice
Law firm Akerman this week announced the launch of its newly created Data Law Practice, and the expansion of the firm's varied services in the increasingly business critical areas of information governance, e-discovery, and data privacy and security. Details inside.
-
Article
The Workflows You Need to Use After a Data Breach
Compliance officers have enough scrambling to do after a data breach. Not understanding the steps to take, or not being in proper position to take them, only makes matters worse. Inside, guest columnist John Reed Stark walks through all the steps your company needs to take—including those to take before ...
-
Blog
AccelOps Enhances Its Integrated IT Security Platform
AccelOps today announced new enhancements to its integrated IT security and operational intelligence platform that enables IT to rapidly detect, prevent, and respond to malicious attacks. Details inside.
-
Article
FSOC Report Offers Tea Leaves for Future Regulatory Focus
What are the top threats to the U.S. financial system? In a new report, the Financial Stability Oversight Council cites cyber-security, financial innovations, and high-frequency trading among the problems regulators must address. Critics fret, however, that the agency wants “to get rid of the capital markets and replace everything with ...
-
Blog
Actiance Supports Skype for Business and Yammer
Actiance, a compliance, security, archiving and e-Discovery provider for critical business communications, announced that it now supports Skype for Business and Yammer. With Actiance’s extended support, companies can control, monitor and archive all their critical communications as they move to the cloud and as they adopt new communication channels. Details ...
-
Article
Suddenly, Washington Is Back at Cyber-Security Discussion
Image: For the first time in years, Washington is abuzz with proposed changes to cyber-security disclosure, both in Congress and at the SEC. Above all, experts say, is a need to clarify terminology and expectations. “There should be minimum standards for what that security should be across the board,” says ...
-
Resource
e-Book: Cyber-Security: Rising to the Challenge
The risk of critical information falling into the hands of hackers is now higher than ever, and governing information remains a struggle. Worse, the technical nuance associated with cyber-security can be somewhat intimidating for internal auditors and compliance officers. While many organizations are trying to avoid falling victim to a ...
-
Article
Data Governance 101: Getting Started
Amassing terabytes of data is easy; for most businesses, managing those valuable—and sometimes very risky—assets is the hard part. A successful data governance initiative, experts say, isn’t a project you can hand off to the IT department or solve with a software purchase. Compliance, audit, and risk executives all need ...
-
Blog
Weaver Launches New IT Advisory Service
Weaver, an independent accounting firm, recently launched a new IT advisory service that provides payment card industry (PCI) data security assessments. Brian Thomas and Brittany George, both in Weaver’s IT advisory services, have met the necessary requirements to earn the Qualified Security Assessor (QSA) certification from the PCI Security Standards ...