Site Map - Proprietary Information Protection

Intellectual Property

- A bill (S. 968) introduced by Sen. Patrick Leahy (D-VT), which would allow the attorney general to take action against Internet sites that infringe on intellectual property rights, has been approved by the Senate Judiciary Committee. The Senate has announced that it will consider the measure.

When a Data Breach Occurs, Companies Must Be Ready to Step Up

- Companies don't only have to minimize the possibility of a data breach, they have to be prepared to help customers and clients out when one occurs.

State Legislation: Massachusetts: Vital Records

- Massachusetts has approved a new law (formerly H.B. 4910) that addresses the security of vital records in the state. The law empowers state and town clerks to refuse to issue a copy of a vital record if they suspect that the request for the record has been falsely made, altered, forged, counterfeited, or procured through fraud.

State Legislation: Mississippi: Data Security

- A new Mississippi law (formerly H.B. 583) requires that companies notify customers of any data security breach (.pdf) if the company reasonably believes that information has been compromised. The bill includes an exception allowing notification to be delayed if it would impede a criminal investigation or harm national security.

Behind the Numbers

- Compliance overtakes security concerns as the primary reason for encrypting data. -----------------------------------------------------------------------------  

Data Theft

- Twenty-seven percent of companies experienced data theft last year, according to the latest Kroll Global Fraud Report (.pdf). This was the first time data theft was the most frequently cited form of fraud in the report.


- 27 The percent of companies that suffered from data theft last year, according to the latest Kroll Global Fraud Report, which polled about 800 international executives.

WikiLeaks Going After Private Sector Next

- The former hacker and WikiLeaks founder Julian Assange tells Forbes that his next big leak will target a major U.S. bank and explains the potential of leaks to keep capitalism ethical and markets free. "We’re creating a tremendous reputational tax on the unethical companies," Assange says.

Cryptography Engineering: Design Principles and Practical Applications

- Cryptography Engineering spells out the difference between good and bad cryptography in great detail.

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

- Companies looking to implement one of the most sensible security standards ever put forth should start here.

The Executive MBA in Information Security

- John Trinckes, Jr., argues that executive leadership is critical to effective data security.

Elsewhere in the Courts: Trade Secrets

- In litigation between an insurance company and its former agents, the company claimed that agents misappropriated trade secrets when they used print-outs from the electronic files of insurance policyholders in their search for other jobs. However, the court found that because the same information from the password-protected electronic files was readily available in another format, unsecured physical files stored in the agents’ offices, it cannot be considered a protected trade secret. (Nationwide Mutual Insurance v. Mortensen et al, U.S. Court of Appeals for the Second Circuit, No. 08-5214-cv, 2010)

Intellectual Property

- A new European study (.pdf) attempts to assess the economic impact of counterfeiting and piracy on creative industries, but a recent GAO study (.pdf) concludes that quantifying the economic effects is difficult, if not impossible.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.