Access "Internet privacy laws will get attention in the next Congress"
This article is part of the December 2010 issue of Inside the Data Accountability and Trust Act and what it means for security
With the Obama Administration's reported "watchdog" plan for online privacy and U.S. Rep. Joe Barton's November statement that Internet privacy policies will be in the crosshairs in the next Congress, privacy remains one of many bulls-eyes for the 2011--2012 policy agenda. Adding to this renewed fervor toward privacy issues, both the Department of Commerce and the Federal Trade Commission are poised to release comprehensive reports regarding the collection, use and security of personally identifiable information. Even the Federal Communication Commission is getting into the mix with its public notice and hearing regarding the regulation of cybersecurity and its recent probe into the information collected by Google Street View. So, here's what enterprises will want to keep an eye on in Washington D.C. for the upcoming year: Cybersecurity Legislation, which we expect to be along the lines of the pending bill proposed by Senator Joseph Lieberman in the 111th Congress, S. 3480, that would address both public and private sector cybersecurity; Do-Not-Track ... Access >>>
Premium Content for Free.
Disaster recovery and contingency planning security considerations
Security must be included in disaster recovery planning to ensure sensitive data is protected.
Customized malware programs require new response, experts say
Cybercriminals are taking advantage of poorly deployed security software with customized malware designed to infiltrate systems and steal data without being detected.
- Disaster recovery and contingency planning security considerations
Understanding the Data Accountability and Trust Act
by Richard E. Mackey, Jr., Contributor
The Data Accountability and Trust Act, if passed into law, would create a national standard for privacy and data protection.
Vendor risk management and the CISO
by Eric Holmquist
The CISO has a key role in reducing the risk of sharing sensitive corporate data with third parties.
- Understanding the Data Accountability and Trust Act by Richard E. Mackey, Jr., Contributor
Cloud computing technology: Don't get left behind
Cloud computing presents a lot of security issues but security professionals need to accept the challenge.
Career advantages of security professional certifications and advanced degrees
by Lee Kushner and Mike Murray
Choose wisely when pursuing industry certifications and advanced degrees to gain the best competitive advantage.
Internet privacy laws will get attention in the next Congress
by Judith Harris, Christopher Cwalina, and Amy Mushahwar
In the 112th Congress, enterprises can expect a heavy focus on Internet privacy issues on Capitol Hill.
- Cloud computing technology: Don't get left behind
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...