The Business-Technology Weave:

acceptable use


June 4, 2010  5:51 AM

Lions and Tigers and Data Breach … OH MY!



Posted by: David Scott
acceptable use, computer education, computer training, data breach, eCulture, IT Wars, security awareness, Security Plan, security policy, security training, the business-technology weave

(with apologies to The Wizard of Oz)

Forty-six States have now enacted data breach notification laws, whereby businesses must contact consumers to advise when their personal...

May 20, 2010  1:55 PM

Insecurity, Part III: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business policy, business risk, business security, data breach, data exposure, data security, data theft, IT policy, IT security, IT Wars, malware, the business-technology weave

[As necessary, please see the first article...


May 16, 2010  10:07 AM

Insecurity, Part II: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, ID theft, IT security, IT Wars, security policy, the business-technology weave

 

Continuing with our exposure of services and associated liabilities from the other day: 


May 15, 2010  9:20 AM

Insecurity: A State Agency’s Data “Security” Posture



Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, IT security, IT Wars, security policy, the business-technology weave

 

I’ve been doing a little work for a big State agency.  By “big,” I mean big budget, large number of...


April 27, 2010  1:02 PM

An IT Deficit



Posted by: David Scott
acceptable use, accpetable use, backup and recovery, BIT, business implementation team, business liabilitiy, centralized data, content, content management, data, data backup, data liability, data management, data recovery

 

A couple articles ago, I talked about a business deficit.  It’s only fair we...


April 23, 2010  8:55 AM

Workplace Privacy



Posted by: David Scott
acceptable use, content management, data access, data privacy, workplace privacy

According to a recent ruling by the New Jersey Supreme Court, a former employee’s past company should not have read e-mails that she sent from a private, password-protected, web account.   Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: