Access "How to avoid Internet liability lawsuits"
This article is part of the October 2009 issue of Winners of Information Security magazine's Security 7 Award
Businesses are facing new risks and increasing liabilities related to their Internet presence and use of the Internet. A decade ago the focus was on Internet privacy issues, but the spotlight has shifted to Internet liabilities and high-profile lawsuits are commonplace. Take Cecilia I. Barnes vs. Yahoo! Inc. In that case, a federal appeals court ruled in favor of the plaintiff, finding that the ISP failed to remove offensive material provided by a third party. Delta Airlines, eBay, iVillage and Ticketmaster are other prominent defendants in cyber lawsuits. Many lesser known organizations also have faced cyber lawsuits, or are vulnerable to one. Understanding the risks associated with the Internet is no longer a necessity solely for ISPs, big business or e-commerce sites. All organizations must become knowledgeable about their cyber exposures and take steps to implement a sound cyber risk management plan. This is especially true now as many Internet liability lawsuits seek class-action status, raising the stakes even higher. There are several categories of ... Access >>>
Premium Content for Free.
Melissa Hathaway: Government Must Keep Pace with Cybersecurity Threats
by Melissa Hathaway, Contributor
Securing the Internet means to much to the future of the U.S. economy and national security.
Bernie Rominski: Communicate Effectively with Management about Risk
by Bernie Rominski
Learn how to communicate with senior management about risk; it's your job.
Information Security magazine 2009 Security 7 Award winners
Information Security magazine annouces the winners of its fifth annual Security 7 Awards.
Jerry Freese: Make Critical Infrastructure Protection a Priority
by Jerry Freese
Critical infrastructure protection must be addressed today to protect our country tomorrow.
Adrian Perrig: Improve SSL/TLS Security Through Education and Technology
by Adrian Perrig
Carnegie Mellon University's CyLab designs security to improve all aspects of society.
- Melissa Hathaway: Government Must Keep Pace with Cybersecurity Threats by Melissa Hathaway, Contributor
Bruce Jones: Report Security and Risk Metrics in a Business-Friendly Way
by Bruce Jones
Security metrics must, not only provide a view of security posture, but must support security budgeting and investment processes.
Tony Spinelli: Prioritize Information Security over Compliance
by Tony Spinelli
Organizations need to prioritize security over compliance to ensure comprehensive risk mitigation.
SOX compliance burdens midmarket security teams
Smaller public companies bear significantly higher pain in terms of revenue and costs per employee complying with Sarbanes-Oxley.
Developers Need Help with Security Errors
SQL injection attacks continue to plague Web applications. Companies need to invest in technology and education to hold off hackers.
Jon Moore: Build a Security Control Framework for Predictable Compliance
by Jon Moore
Health care provider Humana Inc., has developed a security controls framework that addresses all of the industry and federal regulations it must comply with.
- Bruce Jones: Report Security and Risk Metrics in a Business-Friendly Way by Bruce Jones
Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry
Looking back at five years of award winners provides a timeline of security trends that you need to absorb.
How to avoid Internet liability lawsuits
by Jeanne Debus
Enterprises face numerous potential liabilities online. Avoiding lawsuits requires a sound cyber risk management plan.
- Editor's Desk: Security 7 Winners Chronicle Trends That Shape The Industry
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.