|Compliance with the Red Flag rules must take a risk-based approach. Organizations are not given a specific set of items to implement; there is no detailed checklist. Compliance is principle-based focused on the outcome — avoiding identity theft — and not on specific requirements.
Michael Rasmussen, Red Flag Rules compliance demands a risk-based approach
Today’s WhatIs.com Word of the Day is Red Flags Rule.
|Sending spam, or hiring someone to send it for you, is illegal in many countries, including the U.S., where it violates the CAN-SPAM Act of 2003. Using false or misleading header information is also a violation of the CAN-SPAM Act, but since the spammer has already decided to break the law by sending the spam in the first place, adding the crime of email address forging is trivial.
Michael Cobb, Why is backscatter spam so difficult to block?
Today’s WhatIs.com Word of the Day is backscatter spam.
|URL spoofing substitutes an outlaw Web address for a legitimate one. A simple way to do that is to exploit the state of spelling among English-speaking people. A site like eddiebaur .com might fool the eye of a casual Web surfer looking for outdoor gear from Eddie Bauer.
John P Mello, ICANN move contributing to URL spoofing?
Today’s WhatIs.com Word of the Day is the Vouch by Reference protocol.
|Compliance is a hamster wheel of pain. Are we in compliance? -> Hire Consultant -> The Consultant Says No -> Scurry and spend -> Repeat.
Alex Hutton, The Cult Of Compliance
Today’s WhatIs.com Word of the Day is enterprise document management.
|“Because the closed-loop assesses capacity at every level, it shortens the timeframe in which any shortfalls may be detected and rectified.”
Pat Kennedy, Vivek Bapat, Paul Kurchina, Manufacturing plant information management
Today’s WhatIs.com Word of the Day is closed loop MRP.
|FinCEN is now seeking to engage smaller to moderate size depository institutions who are working to implement the four pillars of theBank Secrecy Act regulatory regime: (1) policies, procedures and internal controls; (2) designation of a compliance officer; (3) ongoing training; and (4) independent testing.
Bryan Cave Law Firm, October 2009 Client Alerts
Today’s WhatIs.com Word of the Day is Bank Secrecy Act.
|In cloud computing and virtualization, choosing between open source and commercial offerings means trading off between speed to market, features, support and development costs on the one hand and up-front licensing fees on the other. In a fast-moving market like cloud computing, many organizations will choose to jump-start their efforts by going with a commercial offering.
Sam Charrington, as quoted in Cloud computing provider chooses XenServer over Xen
Today’s WhatIs.com Word of the Day is physical block device.
|The foremost principle of risk communication is that ‘perception equals reality.’ In other words, what is perceived as real is real in its consequences. Employees react to perceived threats, rather than to ‘reality.’ Their level of stress during times of change is proportional to their perception of threat.
Joseph G. Wojtecki, Jr., and Richard G. Peters, Communication Organizational Change: Information Technology Meets the Carbon-Based Employee Unit
Today’s WhatIs.com Word of the Day is organizational change management.
|The convergence happening between social media, mobility and real time is leading to a new set of paradigms, a new set of business activities that SAP needs to go after next. There are entire economies going mobile, and we need to connect to them in real time with social media, analytics and search technologies.
SAP’s CTO, Vishal Sikka as quoted in SAP’s innovation gets overlooked
Today’s WhatIs.com Word of the Day is SAP.
|More access to information doesn’t bring people together, often it isolates us.
Joshua-Michéle Ross, Three Paradoxes of the Internet Age – Part One
Today’s WhatIs.com Word of the Day is paradox.