Information Sciences professor Masooda Bashir discusses the National Science Foundation extension of the Illinois Cyber ...
This Written Information Security Program describes the safeguards implemented by DePauw University to protect confidential data. The goal of the program is to ensure the security of these assets to ...
As threat actors continue to evolve, so does the tooling that protects a firm's environment. In addition to training, security advisories should be distributed on a regular basis, and security ...
The Federal Trade Commission’s Standards For Safeguarding Customer Information Rule (aka The “FTC Safeguards Rule”) is a regulation requiring entities to develop, implement and maintain a ...
The University at Buffalo Information Security Office maintains an Information Security Incident Response Plan providing a framework which ensures information security incidents are managed ...
You should consider these issues for several reasons, but the prime reason is that you don’t need any distractions. Two features of this area of law are poised to become major distractions: ...
In its annual audit required by the Federal Information Security Modernization Act of 2014, OIG said it reviewed HHS programs and practices against its core and supplemental metrics. Through the ...
The FTC proposed a settlement with web hosting company GoDaddy that will force it to implement a robust information security program. The order, says a cybersecurity law expert, has raised the bar for ...