The California Consumer Privacy Act took effect on January 1. By now, most companies should have in place their privacy policies, notices of collection, and access ...
Building and managing a security program is an effort that most organizations grow into overtime. I have worked with startups who had no rules for how assets or networks were used by employees. I also ...
Corporate businesses have an obligation to protect the privacy of all employees and ensure their personal security on the job. Publicly traded companies can also benefit from putting policies in place ...
Banks are tasked by the Uniform Commercial Code (the UCC) with using “commercially reasonable” security procedures when processing funds transfers. This responsibility is constantly evolving as bank ...
Under federal, state, regulatory, and contractual requirements, Michigan Tech is responsible for developing and implementing a comprehensive information security program. The purpose of this document ...
Safety and security are not only practical components of a well-run workplace, many aspects have legal requirements at state and federal levels. Depending on the type of business and the regional ...
This document describes the procedures that should be followed by an individual reporting an incident related to information technology resources. Having an effective incident response is essential in ...