The Stored Communications Act and workplace privacy

Information Security Laws, Investigations and Ethics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • COPPA likely would be as ineffective as CAN-SPAM

    In this Guest Commentary, security expert Ira Winkler talks about antiporn legislation and protecting children from offending online material. 

  • From exposition to exploit: One security book's story

    A new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring. 

  • Best antispam weapon: Mix of roadblocks and global laws

    Give spammers more computations to solve or more fees to pay before they can open e-mail accounts and they'll eventually stop trying. But while these roadblocks slow them down, experts argue diehard spammers will always find ways to push through. 

  • Consequences of Cisco source code theft unclear

    Opinions are divided on the impact of stolen data now circulating on the Internet. 

  • Sasser creator arrested

    German high school student arrested in connection with writing and distributing the Sasser worm, which antivirus experts estimate has attacked tens of millions of PCs across the world. 

  • Are you secure? Adam Putnam says, "Prove it!"

    Rep. Adam Putnam crusades to improve the security of the nation's critical infrastructure. The Florida Republican sounded a wake-up call in the fall of 2003 by drafting, but not filing, the Corporate Information Security Accountability Act. 

  • Episode II: Creating security regualtions

    In our last episode the Kingdom's network and system administrators were slaying fire-breathing worms (and whatnot). 

  • RSA: Can regulation cure security's ills?

    As worms and other exploits continue to blast through holes in vulnerable software, driving up enterprise cleanup costs threefold annually, some folks with pull in the information security industry are starting to talk more about government regulati... 

  • Sealing up holes in disclosures

    A new vulnerability information exchange between critical infrastructure companies and the Department of Homeland Security offers assurances company disclosures won't be made public. 

  • Fighting the hacker myth

    Ira Winkler continues the debate on hiring hackers.