Peter Martin reports: A survey of Australian banks’ call centres has found that half of their staff are prepared to help people access someone else’s financial records. In November, customer experience research firm Global Reviews phoned call centre operators at eight of Australia’s leading banks, including each of the big four. Without identifying themselves as…
Category: Commentaries and Analyses
What is the Cost of a Missing Laptop?
Check out the infographic at ZoneAlarm (H/T, Centennial Man)
Massachusetts Attorney General Reviews 2010 Data Breach and Data Security Regulations Compliance
Ellen M. Giblin writes: With the first anniversary of the Massachusetts Data Security Regulations, 201 CMR 17 (pdf)(“Regulations”), coming in March, the International Association of Privacy Professionals (IAPP) recently hosted a panel discussion providing direct access to the Massachusetts Attorney General’s Office and the Office of Consumer Affairs and Business Regulation to discuss their investigations…
Wikileaks As Security Breach
Ryan Calo writes, in part: The leak represents an appalling security breach—one that makes TJX look like a misplaced diary. As I argue in a previous post, the leak threatens a set of classic privacy harms. One of the central roles of privacy is to help preserve the conditions for intimacy. The leak means that leaders will…
Data Stewardship: Managing Personally Identifiable Information in Electronic Student Education Records
Data Stewardship: Managing Personally Identifiable Information in Electronic Student Education Records SLDS Technical Brief Guidance for Statewide Longitudinal Data Systems (SLDS) SLDS Technical BriefGuidance for Statewide Longitudinal Data Systems (SLDS) November 2010, Brief 2 NCES 2011-602 The growth of electronic student data in America’s education system has focused attention on the ways these data are…
ITRC 2010 Breach Report
The Identity Theft Resource Center has issued its end of year press release. It includes some of the organization’s key findings and stresses the need for more information and mandated disclosures. Breach reports by sector can be found on their site as well as their chronology of the breaches they recorded for 2010: The Identity…