Not Like the Others

(This is the sixth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The third installment can be read here. The fourth installment can be read here. The fifth installment can be read here. These principles, often represented in regulations and privacy…

Details

Being Data – The Principle of Participation

(This is the fifth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The third installment can be read here. The fourth installment can be read here. These principles, often represented in regulations and privacy practices, form the foundation for…

Details

Restricting Users With Admin Privileges Solves the Wrong Problem

CONTROL: Minimize the number of users with domain or local administrative privileges. Such users should use a separate unprivileged account for email and web browsing. This control is misunderstood and doesn’t solve the sensitive data protection problem. The real issue today is not “a machine has been compromised”. It’s “data on a machine has been exfiltrated…

Details

Consent: The Part of ‘Yes’ that We Don’t Necessarily Understand

(This is the fourth installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. The third installment can be read here. These principles, often represented in regulations and privacy practices, form the foundation for how an organization should treat the…

Details

Have Data Will Travel

I was recently invited to speak to senior executives about traveling with electronic devices.  I designed a presentation consisting of 11 slides and guessed it would take about half and hour to do. Was I wrong! It turns out that the topic generated a lot of questions and discussion. Much of which I thought would…

Details

Security Models – One Size Does Not Fit All

Security is a word that brings up many different images depending on your experience, profession or industry.  At a University, not only is the context different than at a bank, but it is different depending on what you are trying to secure.  I do not believe that providing security for an organization is a cookbook…

Details

I am Not a Number, I am a Bunch of Numbers

(This is the third installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. The second installment can be read here. These principles, often represented in regulations and privacy practices, form the foundation for how an organization should treat the customer data they collect.) We’ve both been…

Details

How to Safely Do Business with Infected Systems

An estimated 40 percent of consumer systems are infected with malware and if your organization carries out any type of web commerce, online banking, or other type of financial transaction you must assume that your customer has malware. You can’t afford not to conduct the business so the big question is: How can you have a successful and secure transaction…

Details

Privacy Policies: Would You Give Customer Data to the Government?

(This is the second installment in an on-going examination of the first principles of data privacy and security. The first installment can be read here. These principles, often represented in regulations and privacy practices, form the foundation for how an organization should treat the customer data they collect.) Imagine you belong to one of the largest,…

Details