"Once you identify that person based on the unique characteristics of their face, you could then match it with other databases," privacy advocate Beth Givens says, referring to privacy gaps created by facial recognition technology.
"You can't have someone arrested for violating your policies," says former Bear Stearns CISO Jennifer Bayuk. "The question is: What did he do, and was there a policy that would have prevented the activity?"
Leon Rodriguez, formerly chief of staff and deputy assistant attorney general for the Department of Justice Civil Rights Division, is the new director of the Department of Health and Human Services' Office for Civil Rights.
The inability of the Department of Homeland Security to implement appropriate IT and application controls has placed at risk the confidentiality, integrity and availability of DHS's financial and operational data, according to an audit conducted for the department's inspector general.
Responding to a request for ideas on how to update the Common Rule, which provides guidelines for research on human subjects, the Privacy and Security Tiger Team says a key issue is how to define "research."
"The tech fellows will be given the challenge of working with the projects and complex systems that are only available when working in federal IT," Federal CIO Steven VanRoekel says. "This is the competitive advantage that the federal government holds against the private sector."
Payments are moving away from tangible currency to so-called new economies, where value relies more on reputation than currency. Venues such as Facebook facilitate e-commerce via new economies. But as with any change in the payments scheme, industry experts expect these new economies to be accompanied by new risks.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
The Federal Financial Institutions Examination Council (FFIEC) recently released a supplement to the "Authentication in an Internet Banking Environment" guidance, originally published in 2005. Within this update are "Specific Supervisory Expectations" related to an overall "General Supervisory Expectation" that...