Blog Posts Tagged with "Liability"


Encryption: Myths and Must Knows

April 11, 2012 Added by:Rebecca Herold

Small to medium sized businesses have legal obligations to protect sensitive information, such as personally identifiable information. Here are some of the common long-held myths related to encryption misconceptions...

Comments  (0)


Data Breach Definitions, Costs and Security

April 11, 2012 Added by:Fergal Glynn

Companies that suffer a data breach lose more than just confidential information. Their reputation, productivity, and profitability can all be negatively impacted in the aftermath of even a single incident. The organization may face fines, civil or criminal prosecution...

Comments  (0)


Compliance: Moving Off Dead Center

March 19, 2012 Added by:Mary Shaddock Jones

The cost of implementing a compliance program will vary, however, it isn’t expensive enough to find yourself in front of the DOJ explaining why you spend money on air travel or paper clips than you do on a compliance program. Trust me, you don’t want to be in that position...

Comments  (0)


Cross-Border Sovereignty Issues in the Cloud

March 02, 2012 Added by:Rafal Los

It's about due care, process, and not rushing into a cloud computing migration. Take a rational approach and first understand the parameters you need to operate. Then enforce with prejudice those requirements on your vendors and know the way cloud computing is delivered...

Comments  (0)


Cyber Insurance: Efficient Way to Manage Risk in the Cloud?

February 27, 2012 Added by:David Navetta

While customers may enjoy some short term cost-benefits by going into the Cloud, they may be retaining more risk then they want - especially where Cloud providers refuse to accept that risk contractually). Cyber insurance may be a solution to help solve the problem...

Comments  (0)


Compliance in the Digital Era: Watch Out for the Third Party

February 24, 2012 Added by:Neira Jones

It is crucial that businesses understand which controls are needed to maintain the security of their information assets and it is therefore crucial that suppliers are assessed against the business regulatory and compliance framework...

Comments  (0)


Legal Implications of Social Networking Part 3: Data Security

January 31, 2012 Added by:David Navetta

Technology exists for monitoring and tracking of social media usage by employees. Ultimately however, like social media itself, it comes down to people - risk can only be addressed appropriately if the individuals using social media are equipped to identify and mitigate against it...

Comments  (0)


Legal Consequences of Breaches to Security and Privacy

October 01, 2011 Added by:Craig S Wright

Intermediaries have the ability to stop transgressions on the Web now, but the lack of clear direction and potential liability associated with action remains insufficient to modify behavior. In the face of tortuous liability, the economic impact of inaction is unlikely to lead to change...

Comments  (0)


What the Law Says about Distributing a Virus or Malware

September 20, 2011 Added by:Craig S Wright

It is probable a service provider or content hosting entity will face a degree of liability dependent on intention. If malware is intentionally posted such as in the Morris’ case, no uncertainty as to whether the conception and insertion of the malware was deliberate exists...

Comments  (0)


Defining the Edge of Responsibility in Mobile Applications

September 15, 2011 Added by:Rafal Los

It is critical to let your customers know where your responsibility ends. One of the most dangerous things an organization can do is try to push that perimeter and to protect every client. This can get incredibly costly, and incredibly difficult to defend in court...

Comments  (0)


Bad News For Banks: Courts Side With Customers

September 03, 2011 Added by:Robert Siciliano

The computer or other device the scammer used to access Comerica’s website could surely have been traced overseas and flagged for: hiding behind a proxy, device anomalies such as a time zone and browser language mismatch, past history of online scams and identity theft, and the list goes on...

Comments  (1)


The Legal Implications of Social Networking

June 27, 2011 Added by:David Navetta

Companies are stampeding to exploit social networking. Many legal issues could increase the risk and liability potential of an organization employing a social media strategy. In this multi-part series the InfoLawGroup will identify and explore the legal implications of social media...

Comments  (0)


Get Digitally Secure Before it’s Mandatory

June 17, 2011 Added by:Robert Siciliano

It is possible to secure systems against most cybercrime but that level of security often proves too inconvenient for consumers. As long as banks continue absorbing losses from fraud, consumers remain blissfully ignorant of the consequences of inadequate security...

Comments  (0)


Government to Provide Intelligence on Cyber Threats

January 19, 2011 Added by:Headlines

"I think we all recognize that the government has unique access to information. We need to continue to look for ways to share that information, but also give our universities and our businesses information to be able to protect themselves..."

Comments  (0)


SaaS: Accountability Can Get Lost - Not Liability

January 10, 2011 Added by:Robert Gezelter

Pay-as-you-go applications have undeniable allure. Pay-as-you-go providers have had a major impact, whether characterized as SaaS or ASP. They are now often seen as far more cost-effective means of providing applications than in-house hosting. Taken at face value, the savings seem irresistible...

Comments  (0)

Page « < 1 - 2 > »