Tag Archives: privacy

Go Ask Alec Baldwin

SSL apostate Ian G. refers to an article on estimation of loss due to a privacy breach.I think we are measuring the wrong thing, and operating on these assumptions is dangerous. From the article, a Forrester analyst says: “After calculating … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Auditing Privacy Part 2 – Risk Assessment of Data Loss

The easy way to assess privacy risks is to focus on the impact of data theft to the organization by including the private data as a corporate asset. There are well documented methods to identify the vulnerabilities in means of … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Impacted Molars II

OcclusalPanopticonistas Cyveillance say ID theft is so bad, we are all going to die. Seems like shutting down copyright scofflaws got a little too Web 1.0 for them, so they’ve unleashed their vicious crawling spiders on a search for contraband … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Panopticon Enabled Desktops Increase Productivity!

From Dark Reading, the joys of workforce monitoring software with Ascentive!: “We call it ‘workforce activity management,’” says Schran. “Our latest edition provides all the insight necessary to eliminate time-wasting, increase productivity, and protect private company data.” Or, in the … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Auditing Privacy Part 1 – Ethics and the Canon

It would comfort many compliance auditors to discover the ultimate checklist and tear after their organization’s privacy program, collecting tick marks and developing the dreaded deficiency finding. I say to them, “Google is your friend.” For the more enlightened internal … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Charts ‘n Graphs

From Pogo, this article from Physorg on the classic Evil Hacker v. Evil Suit dilemma. From the article: If Phil Howard’s calculations prove true, by year’s end the 2 billionth personal record – some American’s social-security or credit-card number, academic … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

SSN Panic, Texas Style

Here’s the Computerworld run-down. And here’s the Attorney General’s letter (worth reading) and the proposed bill to change the law Texas HB 2061 so as all the county clerks don’t get thrown in jail. The AG letter says it in … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

It’s the Crime, Not the Tool

Tim Wilson at Dark Reading on IT Security: The New Big Brother: “To identify potential insider threats, IT must monitor end users’ behavior by scanning email, tracking network activity, and even watching employees for “trigger” events that might cause disgruntlement. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Privacy and Security Lessons from Criminal Enterprises: The Corner & PCI

Either you have heard the stories, or encountered first hand the difficulty in convincing an organization’s leaders to take adequate precautions to insure the privacy of identity related data, and maintain the integrity, confidentiality and availability of their information assets. … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Everyday Privacy and Security: The Drug Store

After a conversation with a friend, I thought I’d cite some examples of how privacy and security impact day-to-day life. Here’s the first in the series; though I admit, dissecting the CMEA would take more effort than I have time … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment