Best practices, tips, how tos, tools and legislation about privacy, including data leaks, security breaches, hackers, keeping your network safe and mor.
Fri, May 10, 2013 - BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee's private social networking site.
Wed, May 01, 2013 - To land or keep a job people may soon be forced to buy a personal smartphone, sign away some of their privacy rights and use the phone for work. It's called a BYOD mandate and, according to research firm Gartner, you better get ready for it.
Wed, May 01, 2013 - What is a good BYOD policy? Step one is to clarify the rights of both company and employee and state upfront what's business and what's personal. But there's a lot more to it. In this interview with a technology transactions lawyer, CIO.com explores the do's and don'ts of BYOD policies.
Mon, April 22, 2013 - Will BYOD lead to a rash of lawsuits from employees who feel violated? Or maybe a headline-grabbing, class-action lawsuit? Your company better make sure it has an explicit terms-of-use BYOD agreement. Here are ways companies can protect themselves.
Wed, April 10, 2013 - With a BYOD twist, AT&T agreed to settle a class action lawsuit for overcharging corporate customers for almost seven years. But like most things involving BYOD, this gets complicated.
Tue, January 15, 2013 - Facebook today announced a new search capability--currently in beta--called Graph Search. Here's how your Facebook privacy settings will affect what others can find.
Thu, January 03, 2013 - To make more efficient use of data and improve data protection, take a holistic approach to information governance—one that focuses attention on the most sensitive data while removing impediments to sharing.
Tue, November 06, 2012 - BYOD can wreak havoc on the tenuous relationship between IT and the business. But networking giant Cisco, which has a sophisticated BYOD plan for employees, is hoping more reasonable BYOD policies that permit personal cloud services will help bridge the gap.
Mon, October 22, 2012 - You name it, the government has a pile of data about it: genomics, energy use, the weather and more. Various open data and big data initiatives at the federal government aim to make this information available to anyone who wants it. Can the inherent complexity of big data analytics and the promise of open government coexist?
Tue, October 16, 2012 - If your IT security team must comply with regulations like PCI-DSS or HIPAA, you need to know who accesses your data and what they do with it, even if they're using a mobile device to do it. But performing forensic investigations on mobile devices is trickier than it is on PCs.
Mon, October 01, 2012 - Mobile technology and BYOD give companies Orwellian power, testing the relationship between employers and employees. So far, there's a severe lack of trust that is impeding BYOD progress, says a new survey.
Thu, September 20, 2012 - Attackers are increasingly exploiting a combination of connected systems, poor policy enforcement and human error to cause data breaches, but there have been some information security successes: Spam and phishing attacks are down, reported SQL injection vulnerabilities are on the decline and sandboxing technology is making it safer to open documents like PDFs again.
Mon, July 16, 2012 - What LinkedIn and other recent breaches tell us about widespread security risks as we embrace social media and cloud applications in the enterprise.
Mon, June 18, 2012 - Marketers are increasingly looking to Big Data to provide the insight they need to create richer, more personalized and more targeted messaging for consumers. But collecting that data without making consumers leery of your brand requires data management that respects consumer privacy while creating value for your customers.