ID and access management for compliance
- April 30, 2009
Despite the use of biometrics in security, experts say biometric data should be treated as private information and should be part of risk assessments and compliance strategies.
- September 17, 2008
Roles-based access control starts with the business, but some new technology that automates and audits it helps, too.
- April 22, 2008
Notification law isn't something to learn on the fly. Drafting a post-data breach plan ahead of time could help save face as much as legal wrangling.
- November 01, 2006
When a data security breach occurs, U.S. state laws vary in defining company responsibility. Be prepared by learning the law.