The Stored Communications Act and workplace privacy

Information Security Laws, Investigations and Ethics

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • DHS suffered more than 800 cyber attacks in two years

    Senior officials at the Department of Homeland Security acknowledged hundreds of security lapses Wednesday, but said improvements had been made. 

  • Homeland Security computer weaknesses to be examined

    A House subcommittee is holding a hearing to identify the failures of the Department of Homeland Security (DHS) to secure its information networks. 

  • House passes antispyware bill

    The antispyware bill passed by the U.S. House this week is opposed by software makers who say the provisions would penalize those who distribute legitimate software and Web sites. 

  • Electrohippies Collective

    The Electrohippies Collective is an international group of hacktivists based in Oxfordshire, England, whose purpose is to express its displeasure with the use of the Internet "as a tool for corporate communications and propaganda. 

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. 

  • cypherpunk

    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy. 

  • cyberstalking

    Cyberstalking is a crime in which the attacker harasses a victim using electronic communication, such as e-mail or instant messaging (IM), or messages posted to a Web site or a discussion group. 

  • Do P2P networks share the same risks as traditional ones?

    Although P2P networks have their benefits, organizations still need to be careful with the peer-to-peer technology. In this Q&A, network pro Mike Chapple explains how to protect a P2P network's many nodes. 

  • The trouble with Google hacking techniques

    Some IT security professionals say the threat posed by Google hacking techniques is overblown and that companies can easily avoid it with a layered security program. One skeptical expert is Ira Winkler, founder of the Internet Security Advisors Group... 

  • Employee profiling: A proactive defense against insider threats

    Employee profiling is one technique to combat malicious insiders, but organizations should tread carefully. As identity and access management expert Joel Dubin writes, protecting data and systems against insiders with criminal intentions requires a m...