Bring Your Own Device Security and Privacy Legal Risks
|
|
|
- Rolf Logan
- 10 years ago
- Views:
Transcription
1 Bring Your Own Device Security and Privacy Legal Risks
2 Introduction Information Law Group, LLP National boutique firm with focus on information law Experienced, nationally-recognized privacy, technology, media, advertising & information management attorneys Clients include: Financial institutions, Fortune 10 multinational corporations, Energy, Media companies, payment processors, retailers, start-ups, non-profits Co-Chair American Bar Association s Information Security Committee Certified Information Privacy Professional (IAPP) Former in-house lawyer for ebusiness Risk Group of multi-national insurance company based in New York Chris Paschke Experience working in federal and state government Background in system management and IT security auditing Specialises in IT security management and incident response Currently manages IT security for a large Colorado school district.
3 Road Map Introduction BYOD Basics Information Security and BYOD Privacy and BYOD Incident Response and Investigation of Personal Devices Personal Device Use Policies
4 BYOD Basics
5 BYOD Drivers Mobile device explosion 76 percent of people have Internet mobile device, and 68 percent have a desktop or laptop (Source: Ad Age) But don t forget laptops and desktops Employee satisfaction Too many devices Consumerization of IT ( COIT ) Generational aspect
6 BYOD Drivers Efficiency/productivity Cutting-edge technology
7 BYOD Drivers -- Perceived Cost-Savings Device costs Data costs IT management costs Inefficiencies True cost savings?
8 BYOD Statistics Mobile Web to Rule by 2015 Source: Morgan Stanley Study / Mashable Tech (
9 BYOD Statistics Source: SANS Mobility/BYOD Security Survey, March 2012
10 BYOD Statistics Is BYOD Use Allowed? Don t Know (2%) No 37% 61% Yes Source: SANS Mobility/BYOD Security Survey, March 2012
11 BYOD Statistics No Don t Know Policies Supporting BYOD Don t Know (2%) Yes (standalone) 37% 61% Yes Yes (added to existing) Sort of Source: SANS Mobility/BYOD Security Survey, March 2012
12 Information Security and BYOD
13 Addressing BYOD Security Risk Strategy Not addressing the risk Prohibiting BYOD Limiting BYOD (e.g. limited employees; limited data; limited connectivity; limited devices) Traditional technological security controls
14 Traditional Security Measures Determine and limit the type of devices that can be used Implement minimum system requirements and configurations Install security-related software to the device Encrypt company data on the device Apply security patches Monitor the use of the device to detect misuse, hacking or malware Dictate how the device connects to the company s network Install and update anti-virus software Provide support for the device Obtain/access the device for purposes of an investigation (because the company owns the device).
15 Security Challenges Mobile nature / lost devices Personal use = riskier use More opportunities to pick up virus/get hacked Shared devices Lack of IT / security knowledge sophistication (e.g. configurations, patching, anti-virus) Riskier environments Always in use Multiple device-types and operating systems May need to be treated/configured/secured differently May pose different levels of security risk Constant change -- new devices getting popular all the time
16 Security Challenges Jailbroken/modded devices Think beyond the device Offsite data transfer ( the Cloud ; auto back-up) Applications Social media access and social engineering/social media hacking Device as portal to entire company network Lack of control over device, data and security
17 Security Challenges Consistency and Legal Risk Reasonable security factors Sensitivity of the personal information, Foreseeability of risks Likelihood of damage Medium and format of the record Potential harm from an incident Cost of preventive measures Specific security controls required by law or contract Mass personal information protection law Comply with own policies acceptable risk subjective reasonableness
18 Addressing BYOD Security Risk Strategy Acceptable Use Policies (e.g. , mobile devices, Internet, etc.) Security Policies (e.g. mobile, encryption, password, anti-virus) Social Media Policy Wireless Access Policy Remote Access Policy Remote Working Policies Employee Code of Conduct (or other HR Policies) Incident Response Policies Privacy policies (or PII Handling Policies)
19 Addressing BYOD Security Risk Strategy Authorization and inventorying process Compensating controls Encryption Sandboxing Mobile Device Management ( MDM ) software Tracking/wiping/bricking Personal device use policies Training Key legally: being able to explain that despite security being different, level of protection/risk is the same
20 Privacy and BYOD
21 Privacy Challenges Personal nature of device and expectation of privacy Is prohibited web surfing on a company device allowed on the personal device? Personal data: pictures, videos, personal s, bank statements, tax returns, social security numbers, chat histories, user names/passwords, medical information Mobile nature of the devices Remote working and travel (checking to see if employee is where they are supposed to be) The employee creep out factor (see e.g. requiring employees to provide Facebook password)
22 Privacy Challenges Employee Monitoring Monitoring of company-owned devices Where monitoring may occur on a personal device: While connected to the network Data in transmission between personal device and network Monitoring of sandboxed or company area of mobile device. Monitoring of entire device (e.g. key stroke logger; recording browser history, etc.) Data collection about usage may be monitoring (e.g. logging) Location, location, location
23 Privacy Challenges Investigations Investigations (internal, criminal, audits) Security breach response forensic investigations Litigation holds ediscovery (searching for, preserving and collecting data) Information requests/demands/subpoenas/regulatory investigations Problem: difficult, impracticable/impossible, harmful to try to limit collection and access to noncompany information on/from a personal device
24 Privacy Challenges Expectation of Privacy U.S. Supreme Court -- City of Ontario, California v. Quon 4 th Amendment unreasonable search and seizure Search concerning personal use of a company device Applies to public entity, but instructive to private Was there a reasonable expectation of privacy? Not ruled upon; assumed by the Court Employee policies are a factor in setting expectation Was the search reasonable? Work-related purpose existed Scope and intrusiveness of the search was limited
25 Privacy Challenges Specific Laws Computer Fraud and Abuse Act Unauthorized access/use of computer Electronic Communications Privacy Act --Stored Communications Act Computer Trespass
26 Incident Response and Investigation of Personal Devices
27 Incident Response and Investigation Challenges Loss of control Inability to remotely access device Obtaining physical possession of a device Investigation of employees themselves Incident detection (lost devices v. breached devices; actual v. reasonably suspected breach)
28 Incident Response and Investigation Challenges Investigations (internal, criminal, audits, customers) Security breach response forensic investigations Litigation holds ediscovery (searching for, preserving and collecting data) Information requests/demands/subpoenas/ regulatory investigations (either to company or employee directly)
29 Incident Response and Investigation Challenges Obtaining access to the device and data thereon Physical possession Unlocked/login credentials Unencrypted Remote wiping, bricking of a device Timing issues Incident detection Litigation holds/spoiliation of evidence
30 Incident Response and Investigation Challenges Damage to the device Installation of software may be required Data loss Software corruption Loss of use Privacy issues Cooperation issue Ability to tie to business need and limit scope
31 Personal Device Use Policies
32 PDUP Key Considerations Relationship to other policies Scope of existing policies Conflicts with existing policies Key definitions Personal device Security incident Prohibited information
33 PDUP Key Considerations Privilege v. requirement Personal device system requirements, configuration and limitations Remote connectivity Device support Software installation Expectation of privacy
34 PDUP Key Considerations Security requirements May vary by device No sharing devices Software/configuration requirements Security incident response Detection Notice Cooperation Investigation Remote wiping
35 PDUP Key Considerations Investigations Internal, assessments and audits Subpoenas e-discovery/litigation holds Damage and Liability Consent and waiver
36 Q&A
37 Thank You! David Navetta, Esq., CIPP InfoLawGroup LLP
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)
CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
BYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
PII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
The Dark Side of a Payment Card Breach
The Dark Side of a Payment Card Breach Road Map Introduction The Rules of the Game Pitfalls & Strategies Takeaways Q&A The Rules of the Game What is the Game? Payment Card Industry Data Security Standard
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
STATE OF NEW JERSEY Security Controls Assessment Checklist
STATE OF NEW JERSEY Security Controls Assessment Checklist Appendix D to 09-11-P1-NJOIT P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 Agency/Business (Extranet) Entity Response
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
How To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace
Business Or Pleasure: The Challenges Of Bring Your Own Device Policies In The Workplace Earl (Chip) M. Jones Littler, Dallas [email protected] (214) 880-8115 Michelle B. Brookshire Littler, Dallas [email protected]
BRING YOUR OWN DEVICE
BRING YOUR OWN DEVICE Legal Analysis & Practical TIPs for an effective BYOD corporate Policy CONTENTS 1. What is BYOD? 2. Benefits and risks of BYOD in Europe 3. BYOD and existing Policies 4. Legal issues
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721
Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
Bring Your Own Device (BYOD)
1. Introduction Introduction This document outlines the considerations that the Council needs to consider in relation to its decision whether or not to adopt the current trend (arising from the consumerisation
Privacy Law Basics and Best Practices
Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff [email protected] What Is Information Privacy? Your name? Your phone number or home address? Your email address?
1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established
Network Security ProPosal Form Important Please answer all questions from each section and complete in block capitals. Tick the appropriate boxes where necessary and supply any further information requested.
White Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs
PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs The Identity Theft and Fraud Protection Act (Act No. 190) allows for the collection, use
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
BYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
ACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
White Paper. Data Security. journeyapps.com
White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management
Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.
Written Information Security Plan (WISP) for HR Knowledge, Inc. This document has been approved for general distribution. Last modified January 01, 2014 Written Information Security Policy (WISP) for HR
Miami University. Payment Card Data Security Policy
Miami University Payment Card Data Security Policy IT Policy IT Standard IT Guideline IT Procedure IT Informative Issued by: IT Services SCOPE: This policy covers all units within Miami University that
Data Privacy and Gramm- Leach-Bliley Act Section 501(b)
Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley [email protected] (503)276-6074
BYOD At Your Own Risk Working in the BYOD Era Shane Swilley [email protected] (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the
The Law of Web Application Hacking. CanSecWest March 9, 2011 Marcia Hofmann, EFF
The Law of Web Application Hacking CanSecWest March 9, 2011 Marcia Hofmann, EFF what we ll talk about today Three situations you should recognize and approach with caution when you re doing security research
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v2.18.11, rev
Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms v2.18.11, rev 1 Presenters Joseph DeMarco, Partner DeVore & DeMarco, LLP Lauren Shy, Assistant General Counsel Fragomen,
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
PCI Data Security Standards
PCI Data Security Standards An Introduction to Bankcard Data Security Why should we worry? Since 2005, over 500 million customer records have been reported as lost or stolen 1 In 2010 alone, over 134 million
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
Best Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy
Central Texas College District Human Resource Management Operating Policies and Procedures Manual Policy No. 294: Computer Security Policy I. PURPOSE To identify the requirements needed to comply with
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
A framework for auditing mobile devices
A framework for auditing mobile devices Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. 2010 Baker Tilly Virchow Krause, LLP
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Administrative Procedure 3720 Computer and Network Use
Reference: 17 U.S.C. Section 101 et seq.; Penal Code Section 502, Cal. Const., Art. 1 Section 1; Government Code Section 3543.1(b); Federal Rules of Civil Procedure, Rules 16, 26, 33, 34, 37, 45 The District
Wellesley College Written Information Security Program
Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
