Legal

E11e506024f5d2b70f037b9af4734f33

Tallinn Manual on International Law Applied to Cyber Warfare

September 06, 2012 Added by:Stefano Mele

The Tallinn Manual pays particular attention to international law governing the use of force as an instrument of national policy and laws regulating the conduct of armed conflict, also labeled the law of war, the law of armed conflict, or international humanitarian law...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Leadership in the Compliance Department

September 05, 2012 Added by:Thomas Fox

While a leader can provide some insights based on experience, and perhaps give a different view, the employee who brought up the compliance issue will probably be more intimately involved with it. The employee may have thought through a resolution to the potential issue as well...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Research Sheds Light on New Surveillance Apps for Smartphones

September 04, 2012 Added by:Electronic Frontier Foundation

The FinSpy Mobile analysis will allow vulnerable and at-risk users to better understand the threat of government surveillance and make better judgements to protect their security and privacy. This software is sophisticated and powerful...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How Do You Change an Unhealthy Compliance Culture?

August 29, 2012 Added by:Thomas Fox

The best way to effect culture “is to combine strong leadership with the existing internal elements of a healthy corporate culture... while it may take as long to create a good culture as it does to establish a good reputation, a strong set of values is usually harder to destroy unless the company is itself dismantled..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

TPP: Don’t Let Them Trade Away Internet Freedom

August 28, 2012 Added by:Electronic Frontier Foundation

The intellectual property (IP) chapter would have negative ramifications for freedom and innovation and second, the process has shut out multi-stakeholder participation and is shrouded in secrecy. The TPP is a threat because it rewrites global rules on IP enforcement and restrict the public domain...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FTC Seeks Comment on Proposed Revisions to COPPA Rule

August 27, 2012 Added by:David Navetta

The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...

Comments  (2)

7ddc1f3000a13e4dfec28074e9e7b658

California Location Privacy Bill Passes Assembly

August 26, 2012 Added by:Electronic Frontier Foundation

The bill requires law enforcement to obtain a search warrant anytime it requests location information from an electronic device. It codifies the Supreme Court's decision from earlier this year that the installation of a GPS device for purposes of an investigation requires a search warrant...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

How Do You Change to a Culture of Compliance?

August 23, 2012 Added by:Thomas Fox

Unlike the insurance industry, which helps companies manage risks through financial instruments, risk management attempts to avoid or at least control risk. The next time you hear the mindless prattle of “but we’ve always done it that way”, get some ideas on how to change your company’s compliance culture...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Illinois Bars Employers from Obtaining Social Media Credentials

August 20, 2012 Added by:David Navetta

Although privacy advocates and federal regulators and legislators have primarily been focusing on consumer privacy issues, such as behavioral advertising and data mining, the significant changes in workplace privacy protections demand continued vigilance from employers...

Comments  (1)

59d9b46aa00c70238bb89056cfeb96c0

Lessons in the Evolution of Compliance in China

August 16, 2012 Added by:Thomas Fox

As Chinese companies engage with partners, globally and locally, their internal and external business practices are evolving. The article “The Myths of Gift Giving” found that many Chinese companies now put greater emphasis on professionalism and building trust and confidence in business capabilities...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

The Rise of the Virtual-Plagiarist

August 13, 2012 Added by:Ben Rothke

Amazon is a prime feeding ground for the virtual-plagiarist given that Amazon makes a profit off everything sold, and they have no incentive to stop such practices as it would affect their profitability. Amazon takes a kid-gloves approach to plagiarism. That is all the more true for virtual-plagiarized text...

Comments  (3)

7ddc1f3000a13e4dfec28074e9e7b658

FBI’s Facial Recognition is Coming to a State Near You

August 07, 2012 Added by:Electronic Frontier Foundation

The FBI wants to be able to search and identify people in photos of crowds and in pictures posted on social media sites—even if the people in those photos haven’t been arrested for or even suspected of a crime. The FBI may also want to incorporate those crowd or social media photos into its face recognition database...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Court Dismissed Another Data Breach Suit

August 06, 2012 Added by:David Navetta

The Holmes decision further underscores difficulties in securing any recovery on a data breach lawsuit absent actual identity theft. However, the lengthy history of this case — dating back to 2008 including a challenge to a Court approved settlement — highlights that such cases are protracted and costly to defend...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

A Victory Over Cyber Spying

August 04, 2012 Added by:Electronic Frontier Foundation

Congress has been working to pass cybersecurity legislation for years – and EFF has fought to ensure that civil liberties weren’t sacrificed in the process. This year was the hardest: Congress got closer than ever to enacting a bill that could threaten the privacy of online communications. We fought back...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EU Weighs in on Face Recognition Applications

July 29, 2012 Added by:Electronic Frontier Foundation

Face recognition in online applications is particularly problematic as personal data is sometimes used out of context by employers and law enforcement. Therefore, European privacy officials’ opinion recommending various practices for these applications could not have come at a better time...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Take the A-Train to Find Your Compliance Team

July 25, 2012 Added by:Thomas Fox

As the compliance field evolves, the need for experienced professionals continues to grow, there is the need to hire top notch compliance talent to do the day-to-day work of implementing, enhancing or running a compliance program. Where can you go if you want to hire some experienced compliance professionals?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »