Jamie Komarnicki reports: The provincial government and the University of Calgary must do a better job of protecting against unauthorized access to confidential online information, warns Alberta’s auditor general. Service Alberta and the U of C each came under fire in Merwan Saher’s latest report, released Tuesday, for not demonstrating they’ve implemented adequate security policies,…
Category: Commentaries and Analyses
Did Dutch Police Break the Law Taking Down a Botnet?
Interesting article by Jeremy Kirk about how Dutch police may have broken the law in an attempt to get control of a botnet and to warn innocent users that their systems were infected: Dutch police took unprecedented action in taking down a botnet on Monday: They uploaded their own program to infected computers around the…
Will The ICO Make An Example Of Google? (I hope not)
Almost one month ago, the UK’s ICO announced that fines for data breaches were “imminent.” Maybe “imminent” means something different in UK English than in New Yorkese, where we tend to be impatient, but nothing happened. Now Peter Judge of eWeek suggests that, for a variety of reasons, Google might make a good first target….
UK: Moving on from the 2007 data loss by HMRC
The loss in 2007 by Her Majesty’s Revenue and Customs of 25 million people’s details was a major warning to the public sector. Rob Buckley says that the private sector should also take heed. SC Magazine has a lengthy article reviewing the HMRC breach and its aftermath, with lessons learned and lessons to-be-learned by the private…
FinCEN report: Identity Theft Trends, Patterns, and Typologies Reported in Suspicious Activity Reports Filed by Depository Institutions January 1, 2003 – December 31, 2009
From the Financial Crimes Enforcement Network report, Identity Theft Trends, Patterns, and Typologies Reported in Suspicious Activity Reports Filed by Depository Institutions January 1, 2003 – December 31, 2009, the Executive Summary: Identity theft was the sixth most frequently reported characterization of suspicious activity within the period of the study, behind structuring/money laundering, check fraud, mortgage loan fraud,…
What’s the actual cost of a FACTA breach?
We’ve seen some impressive figures for the cost of data breaches, but what’s the cost of a FACTA breach? Has anyone seen any analysis of actual costs in resolved or settled cases? Back in May 2009, Olive Garden settled a class action lawsuit stemming from alleged violations of FACTA. Because receipts included more than…