mdpeters posted 3 items. ITIL ITIL ITIL mdpeters posted User:Saberforge1967. mdpeters posted User:Jjlacour. mdpeters posted User:Mumia.
Weekly Digest for September 8th
mdpeters posted 2 items. HIPAA HITECH mdpeters posted User:Unitu.
Machinery
“Some people are just cogs in a machine while others are the machine.” – Michael D. Peters
Weekly Digest for September 6th
mdpeters posted User:Olita. mdpeters posted 2 items. Computer Crime Statues by State Law
Easiest way to breach a bank? Just hold-em-mop!
On July 29, 2011, Massachusetts Attorney General Martha Coakley announced a $7,500 settlement with Belmont Savings Bank following a May 2011 data breach involving the names, Social Security numbers and account numbers of more than 13,000 Massachusetts residents. The bank has stated that it has no evidence of unauthorized access to or use of consumers’… Read More
Expanding Security Breach Notification Requirements in California
A new amendment to California’s security breach notification law will raise the stakes for businesses required to give notice of a data security breach affecting California residents. California Senate Bill 24 (“SB 24”), signed by Governor Brown on August 31, 2011, imposes detailed new requirements for the content of security breach notices. Significantly, SB 24… Read More
Weekly Digest for September 1st
mdpeters posted HIPAA. mdpeters posted 5 items. Protected computer Legal Electronic Data Exchange Standard Electronic data interchange Computer Fraud and Abuse Act Computer Fraud and Abuse Act mdpeters posted 2 items. User:Ballahelm1985 User:Ghumphry
Geolocational Privacy and Surveillance Act – First Blush
The law does not lead, it follows. Our system is very reactive in nature. It tends to change, without my surprise, like people generally do as a direct result to negative events or influences. Smokers quit following the heart attack and our legal system create laws based upon past events. GPS technology has been around… Read More
Juris Doctor 144 of 161: The End is Near
The final push has arrived. The last remaining months before graduation. December will be here soon enough, but not soon enough for this student of law. I’m at the point where every class and every chapter takes a huge effort to drag myself through it. It really has little to do with law and everything… Read More
Weekly Digest for August 25th
mdpeters posted 2 items. User:CalvertRushplh User:CalvertRushplh mdpeters posted 8 items. User:RichardWashingtonimi User:DrewBoonevxy User:EatonChapmanteh User:FrancisMayszrs User:FrancisMayszrs User:EatonChapmanteh User:DrewBoonevxy User:RichardWashingtonimi mdpeters posted 3 items. Computer Fraud and Abuse Act Computer Fraud and Abuse Act
The PCI Challenge
It is frequently in the news. Reports have been written. Punitive and compensatory damages have been awarded. Companies around the globe have been challenged to find the resources required to comply with the Payment Card Industry Data Security Standard (PCI DSS). The prime PCI DSS objective is to protect cardholder data. The prime objective of… Read More
Weekly Digest for August 18th
mdpeters posted User:LandryGardnerjtz. mdpeters posted 2 items. User:Ballann69 User:Teetemp mdpeters posted User:Bloodfire71.
Weekly Digest for August 11th
mdpeters posted . mdpeters posted User:Paige84.
Insecurity
If you think that absolute security exists you would be absolutely incorrect. Speaking as a security practitioner who has been in the business for as long as there has been a security business, I’ll tell you with a straight face that no technology system exists that is completely secure or one hundred percent impenetrable. The… Read More
Reality Check
“A human loses contact with reality if he or she is not surrounded by validated information.” – Michael D. Peters
Juris Doctor 135-143 of 161: The Geek Shall Inherit the Universe
Cyber-espionage and Cyber-warfare poses the greatest threat to our society today. No longer are massive militarized forces with the most advanced weaponry the force to fear. The forces to be feared now are computer geeks. A single person or just a few cyber-savvy individuals working together as a team now possess the power to bring… Read More
Dropbox? More Like Dropball!
There has been a putative class action complaint filed on June 22, 2011, in the United States District Court, for the Northern District of California alleging that the popular cloud-based storage provider Dropbox, Inc. failed to secure its users’ private data or to notify the vast majority of them about a recent data breach. According… Read More
Weekly Digest for July 27th
mdpeters posted User:Ekete. mdpeters posted User:Entlipa.
David (Michael) v. Goliath (Register.com)
I have several domain names registered. Over the years, the registrars I’ve used at times have changed and this is driven largely by competitive parking prices. A domain is very much like an automobile. You make a visit to the dealership (registrar) and purchase the vehicle of choice. You make regular payments and enjoy your… Read More
March to a different drummer
“He who joyfully marches to music in rank and file has already earned my contempt. He has been given a brain by mistake, since for him the spinal cord would fully suffice.” — Albert Einstein
How do you transition your IT teams from a technology to business mindset?
It is incumbent upon the technology leadership, who should already have an excellent business grasp, mentor, demonstrate and illustrate what lines of activities comprise the essence of the company’s mission. Only then will the supporting staff be able to accurately support those business activities with an accurate technological layer. If the technology leader does not… Read More
Back to Basics
“A man loses contact with reality if he is not surrounded by his books.” – Franois Maurice Mitterrand I am not certain when Mitterrand made that statement, but it may have very well been in my lifetime since he died in 1996. In our current age of digital books, Nooks and Kindles, reality television and… Read More
New PCI Data Security Standards for Cloud Compliance
The PCI Security Standards Council’s Virtualization Special Interest Group recently published its “Information Supplement: PCI DSS Virtualization Guidelines” (the “Guidelines”) to Version 2.0 of the PCI Data Security Standard (“PCI DSS”). The Guidelines provide context for the application of the PCI DSS to cloud and other virtual environments, and offer at least three critical reminders:
Weekly Digest for July 7th
mdpeters posted User:Aleadala.