INFORMATION

Site Map - SM Online

SECURITY CLEARANCES

- The U.S. government is moving to make continuous evaluation part of the security clearance process beginning this fall. The U.S. Office of Management and Budget illustrates the timeline for implementation in its Suitability and Security Processes Review, a report to President Barack Obama that was released in February 2014.

Privacy

- Australia has enacted a new amendment that will broaden the definition of personal information and require more transparency from organizations on how that personal information is stored. The new law, The Privacy Regulation 2013, is part of the broader Privacy Amendment Act of 2012 and applies to companies with revenues of more than AUD 3 million that collect information, such as names, contact details, payment information, or other details related to a specific person, for any purpose.

CPTED Books

- Two newly updated books on Crime Prevention Through Environmental Design, or CPTED, are available now from the ASIS Store. Look for item #2163, the third edition of Crime Prevention Through Environmental Design by Timothy Crowe and updated by Lawrence Fennelly, and item number #2078, the second edition of 21st Century Security and CPTED by Randy Atlas, CPP.

Liability

- A federal court has ruled that the Federal Trade Commission (FTC) can advance with a lawsuit against a hotel group for allegedly failing to safeguard consumers’ personal information. The FTC accused the Wyndham Worldwide Corporation of failing to implement adequate security in its computer system, which led to three data breaches between April 2008 and January 2010.

Cybersecurity

- The 2014 Security Threat Report from Sophos explores the latest trends in cybersecurity and the most malicious threats to enterprises, government, and individuals on a global scale. The report looks at risks like targeted threats to financial accounts, Android malware, and the end of support updates for Microsoft’s Windows XP operating system.

A Plan to Stem Extremism

- Since 9-11, there have been more than 200 U.S.-based al Qaeda violent extremists arrested over a combination of 60-plus attempted and successful plots. In response, the Muslim Public Affairs Council has released the Safe Spaces Initiative: Tools for Developing Healthy Communities to help community leaders prevent extremist ideas from turning into dangerous actions.

Parody

- The National Security Agency (NSA) and the Department of Homeland Security (DHS) settled a lawsuit with an activist who was selling merchandise using their logos. The NSA and DHS acknowledged that merchants who use images and names of government agencies on parody merchandise are not in violation of any federal laws.

Gun Rights

- The U.S. Supreme Court refused to re-enter Second Amendment gun controversies and denied to hear three cases seeking clarification on the scope of an individual’s right to have a gun for personal self-defense.

Employment

- A New York court has ruled that employees’ immigration status does not affect the employer’s rights under Workers’ Compensation Law section 11. Instead, employers have economic protections under the law regardless of employees’ immigration statuses.

Drones

- A federal judge dismissed a case challenging the Obama administration’s use of unmanned drones to kill terrorism suspects overseas. In her opinion, Justice Rosemary M. Collyer wrote that the courts cannot create a remedy for targeted killings without intruding on the powers of the president and Congress to wage war.

Nuclear Safety

- Since the Fukushima Daiichi nuclear disaster in 2011, nuclear regulators around the globe have introduced new requirements to improve nuclear safety and security. The Government Accountability Office details the new changes and elaborates on measures still needed to improve nuclear security in the United States.

Trade Secret Theft

- Trade secret theft costs industry billions of dollars each year and no company is immune to trade secret misappropriation. In a recent white paper, the Center for Responsible Enterprise and Trade details how widespread trade secret theft has become and how companies can mitigate the risk of trade secret misappropriation.

Espionage

- The NATO report Pandemonium: Nation States, National Security, and the Internet looks at nation-state hacking and the power of espionage in modern culture.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.