INFORMATION

Site Map - SM Online

Data Brokers

- A federal court allowed a man to pursue legal action against an investigative service that provided his personal information to a data broker. The court ruled that the service “failed to use reasonable care” in distributing the man’s information, which was later used for an improper purpose.

Online Pharmacies

- One estimate suggests that there were over 36,000 rogue Internet pharmacies in operation as of February 2014, and these rogue sites violate a variety of federal laws, according to a government report. The report also discusses the substantial challenges investigating and prosecuting those involved with rogue Internet pharmacies, which are often complex, global operations.

Fire Prevention

- After two years of the worst wildfires in the state’s history, Colorado’s Legislative Council formed the Wildfire Matters Review Committee to review and propose legislation related to wildfire prevention, mitigation, and related matters. The committee’s findings were published in January 2014 and recommended changes to state law, including new bans on agriculture burning and fireworks.

Infrastructure Protection

- To address additional security concerns facing critical infrastructure, the Department of Homeland Security has issued an updated version of the National Infrastructure Protection Plan (NIPP). The new NIPP outlines how the government and private sector in the critical infrastructure community can work together to manage risks in the 16 critical infrastructure sectors.

911 Calls Scrutinized

- A January report from the Government Accountability Office reveals that 911 emergency calls may not be cyber safe. The document addresses five agencies that coordinate with state and local governments on cybersecurity-related activities, including the Department of Homeland Security, and cites the increased information-sharing between these agencies as a security concern. “Because these critical systems are becoming more interconnected, they are also increasingly susceptible to cyber-based threats that accompany the use of Internet-based services,” states the report. “This, in turn, could impact the availability of 911 services.”

Airport Screening

- A Government Accountability Office report recommends that the Transportation Security Administration no longer fund its behavior detection programs because they are generally ineffective. Its meta-analysis of hundreds of studies found that the ability of human observers to accurately identify deceptive behavior based on behavioral cues is the same as or slightly better than chance.

Educational Opportunity: Security Force Management

- ASIS International is offering a two-day program designed to help security professionals learn more about managing a contract security force. The job requires an understanding of the law, management practices, technology, and best practices and procedures. This program delivers an update on these core management requirements and also spells out what separates a great contract security agency from an average one.

Data Protection

- The IT Risk/Reward Barometer, conducted by the nonprofit global association ISACA, examines the gaps between what people believe and what they do when it comes to the Internet and sharing information online. For example, people tend to fear that their information is at risk, but most continue to be careless with their passwords.

Pregnancy Discrimination

- A federal appeals court has ruled that an employer who terminated a pregnant employee is guilty of pregnancy discrimination. The court ruled that because her managers discussed her pregnancy in relation to her termination, saying that her “belly would be in the way,” the comments were discriminatory.

Cruise Line Security

- The cruise industry and federal agencies have implemented 11 of 15 of the Cruise Vessel Security and Safety Act provisions introduced in 2010. A report by the Government Accountability Office examines the delay in regulations and policy for the implementation of the remaining four provisions, including man-overboard technology.

Document Destruction

- A joint study conducted in January by the Ponemon Institute and Cintas shows that one-third of businesses do not have a policy for secure document destruction. Of those organizations that do have a policy, more than half say the guidelines do not cover the secure destruction of hard drives. Read about these and other findings in the full report.

Corruption

- A new report from the Center for Strategic and International Studies (CSIS) highlights corruption as a priority area for both the private sector and development implementers. The report, The Costs of Corruption: Strategies for Ending a Tax on Private-sector-led Growth, says that reducing corruption should be a major focus of development assistance and diplomacy, but of trade coalitions and business community efforts as well.

Infrastructure Protection

- The Department of Homeland Security (DHS) released an updated National Infrastructure Protection Plan (NIPP) in December to help secure critical infrastructure assets, systems, and networks that Americans depend on in the new year. Along with the plan itself, DHS has also issued supplements for the plan geared towards helping the infrastructure community implement the plan, including sector-specific plans and resources for state and local partners.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.