Tanya Forsheit writes: Many of us have watched over the past few years as dozens of proposed federal data security and breach notification bills have been introduced, often with bipartisan support, but have failed to become law. This year has seen many of the usual proposals. For those of you keeping track, this year’s bills…
Category: Commentaries and Analyses
Most attacks on federal networks financially motivated
Jill R. Aitoro reports: Most malware attacks against federal agencies are financially motivated, seeking to trick computer users into buying fake security software or providing personal information that can be used to hack into their bank accounts. Although espionage and terrorism often are considered the primary motivations for breaking into government networks, 90 percent of…
How not to address child ID theft
Over on Emergent Chaos, Adam disagrees with ITRC’s proposed Minors 17-10 Database to reduce child identity theft: …. Unfortunately, this idea is totally and subtly broken. Today, the credit agencies don’t get lists from the SSA. This is a good thing. There’s no authorization under law for them to do so. The fact that they’ve…
EMI v. Comerica: Court Finds Commercially Reasonable Security — Bank Loses Motion for Summary Judgment
David Navetta provides a legal analysis of the court’s denial of the bank’s motion for summary judgment in the case. An odd result — we know. We previously reported on the lawsuit filed by Experi-Metal, Inc. (“EMI”) and the subsequent motion for summary judgment (and briefs) filed by Comerica Bank to have the case dismissed….
DWP plugs up electronic data leaks
Kable reports: The Department for Work and Pensions has reported data leaks from paper but none from electronic devices over the year. Its resources accounts (PDF) for 2009-10 reveal that in April 2009 it lost paper documents from its offices which contained the names, dates of birth, national insurance numbers and bank details of 145…
S’pore firms prone to data theft
Kenny Chee reports: Singapore companies are too trusting with their data, and are all too willing to give out confidential information to vendors and partners. That’s according to a security expert in the United States, who says that this creates a hotbed for cybercrimes like data theft. Mr Bryan Sartin, director of investigative response at…