Information Security Laws, Investigations and Ethics

Information Security Laws, Investigations and Ethics News

  • December 12, 2014 12 Dec'14

    Sony Pictures hacking back: The ethics of obfuscation

    News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.

  • October 31, 2014 31 Oct'14

    Verizon's mobile persistent cookie is more trick than treat

    News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS ...

  • October 10, 2014 10 Oct'14

    Are offensive hacking courses ethical? Debating the ethics of hacking

    News roundup: Colleges across the country are offering courses in offensive hacking, but are they ethical? Plus: Why the first 'online murder' may happen in 2014; Palo Alto and NSS Labs make up; numerous Android security issues surface.

  • September 12, 2014 12 Sep'14

    Situational awareness software raises surveillance questions

    News roundup: City-sponsored situational awareness software use at a music festival illustrates the importance of enterprise surveillance strategy evaluation. Plus: Apache Tomcat upgrade; OpenSSL security policy; and call center security concerns.

View All News

Information Security Laws, Investigations and Ethics Get Started

Bring yourself up to speed with our introductory content

  • wiretapping

    Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications. Wiretapping is achieved either through the placement of a monitoring device informally known as a bug on the wire in ... Continue Reading

  • privacy policy

    A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations. Most websites make their privacy policies available to site visitors.  A privacy page should specify ... Continue Reading

  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)

    The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other methods of using the Internet to obtain sensitive ... Continue Reading

View All Get Started

Evaluate Information Security Laws, Investigations and Ethics Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Information Security Laws, Investigations and Ethics

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Information Security Laws, Investigations and Ethics Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close