Inviting Data Hackers to Lunch Without Knowing it
|
|
|
- Cory Rogers
- 10 years ago
- Views:
Transcription
1 Reynolds and Reynolds Inviting Data Hackers to Lunch Without Knowing it And Getting Stuck with the Tab Bob Schaefer, Vice President of Data Services Reynolds and Reynolds
2 Inviting Data Hackers to Lunch Without Knowing it came in through the Chinese takeout menu. That s the way the first sentence reads in a recent New York They Times article on data and network security. [The Target] breach affected nearly one third of the U.S. population. outside service providers connected remotely have the keys to the castle. The story went on to say that when the hackers were unable to breach the main network of a large company, they added malware to the online menu of a popular Chinese restaurant that employees used. The result? When the workers browsed the menu, they inadvertently downloaded code that gave the attackers a foothold in the business s vast computer network, the article said. When Target was hit with a massive data breach of consumers personal and payment information last year, the hackers went in through the heating and cooling system software, after Target had granted permission for a third-party vendor to access its network. That breach affected nearly one third of the U.S. population. Commenting on the Target breach, the chief executive of a network security firm was quoted in the media as saying, We constantly run into situations where outside service providers connected remotely have the keys to the castle. While online takeout menus and heating and cooling systems are not the most prevalent threats to automotive dealerships, the examples illustrate the difficulty and vigilance required in protecting dealership networks and vital business and customer data. As more dealership management systems (DMS) and networks are connected to more remote devices and to other service providers, the vulnerabilities are both more obvious and also more likely to lurk in unlikely places. The Double Burden of Data 2 In today s competitive automotive retailing environment an environment in which dealers are no longer compared simply to other dealers, but also to other retailers dealers are adopting a retail mindset and harnessing the data already at their fingertips in their customer database. Harnessing that data often requires the involvement of third-party specialists who can help the dealer turn the data into useful business information to advance the dealership and improve the customer experience. The business imperative to reach the right customers at the right time in the right way with the right messages Customer Relationship Management for Dealerships [email protected] Is No Mickey Mouse Application
3 dealers carry a double burden: They own a portion of the data in the DMS. They also retain custody over a portion of data owned by others And, they are responsible for protecting all of the data also puts a higher premium on the data in the dealership s customer database and brings greater scrutiny to how it s handled, protected, and used. And therein lies the rub. There was a day when unmonitored, unchecked access to the DMS by third parties access that often was automated was the norm. Those days are over. A dealer s permission alone is no longer adequate protection for a third party to access data in the DMS; a third party s assurance to only access the information they are authorized to access is no longer an adequate safeguard for data in the DMS. That s too simplistic a view of the issue. It s an equally simplistic view that the data in the DMS belongs to the dealer. It was never really the dealer s data to begin with at least not all of it. Certainly, there is business data in the DMS that belongs to the dealer. Yet there is also consumer information that still belongs to the consumer (they haven t relinquished their ownership); There is proprietary OEM information that belongs to the manufacturer; and There is information from the DMS provider that is proprietary and belongs to the provider. The result is that dealers carry a double burden: They own a portion of the data in the DMS. They also retain custody over a portion of data owned by others but that resides in the DMS. And, they are responsible for protecting all of the data in the DMS to ensure safeguards and protections within the appropriate business and regulatory framework(s).?? Dealer Data OEM Data Whose data is it? Consumer Data?? DMS Provider Data 3
4 Enter the Federal Trade Commission (FTC) The FTC s mandate from Congress gives the agency authority over privacy and data security. Here s how one of the attorneys at the FTC put the issue: Businesses need to take a hard look at what kind of information they re dealing with day-to-day and what they have on their computer systems. That should serve as a wake-up call for automotive retailers and OEMs, even though fears of other regulatory actions may have overshadowed it. businesses are collecting more personal information about consumers, storing and transmitting it and creating a greater likelihood that the data may be compromised. Over the past 18 months, the automotive industry and individual dealers have been especially focused on the Consumer Financial Protection Bureau (CFPB) and the potential for more government involvement in dealership F&I practices. While that may be a legitimate concern, it also may have inadvertently lulled dealers into overlooking the potential of a larger disruption to their business practices and operations: data security requirements and regulations. That s the FTC s purview. In congressional testimony earlier this year, FTC Chairwoman Edith Ramirez noted that information is the new currency in an increasingly connected world and data-driven economy. She also noted that businesses are collecting more personal information about consumers, storing and transmitting it across their own systems, and creating a greater likelihood that the data may be compromised. Never has the need for legislation been greater, the testimony said. With reports of data breaches on the rise Congress needs to act. Clearly, if dealerships don t secure their data in ways that pass muster with the FTC, then they ll be pulled further into the FTC s enforcement orbit. Enter the National Automobile Dealers Association (NADA) To NADA s credit and the benefit of the industry NADA has taken a firm stance for the industry and has stepped forward with critical guidance around dealership data security. NADA put a stake in the ground, drew a sharp line between old and new (here s 4
5 how the industry used to operate; here s how we need to operate in the future), and pushed this issue top of mind for the automotive industry and for individual dealers. In 2013, NADA published a memo with guidelines on service provider contract language and a dealership s obligation regarding Non-Public Personal Information (NPPI). The Dealer Data Guide memo also includes a checklist to use to help ensure the safe and secure movement of data to external providers. Here s how the memo frames the issue: An important issue to understand is that the FTC may consider any third party access to NPPI to be the equivalent of sharing. In other words, if a third party has access (via your computer network or otherwise) to NPPI or could access it, you may be deemed (or at least alleged) to have shared that data, even if the third party never actually accesses, obtains, processes or relies upon the data. Remember, it is not only the data they actually take, but the data they could take (have access to), that you must control. What does this mean for dealers? The NADA memo says that dealers need to (1) understand exactly what data a service provider needs to provide the service, and (2) take the appropriate technical steps to ensure that their access is limited to that data and that data only. Remember, it is not only the data they actually take, but the data they could take (have access to), that you must control. Finally, as part of the Dealer Data Guide, NADA recommends that dealers implement a strict data push system for sharing data. What s Next for Dealers? Several practical conclusions come to mind from the NADA Dealer Data Guide memo and the active interest by the FTC in privacy and data security. First, access to data equals sharing data. Therefore, if you are concerned about how and where data from the DMS is shared and used, draw the line at access. Prevent access and you prevent sharing. Second, push data from the DMS, which eliminates the need for third parties to access the DMS directly to pull data from it. Third, the FTC is adopting a fairly liberal chain of custody model that includes a burden of responsibility for all of those in the chain of handling consumer data. 5
6 That makes it virtually impossible for a dealership or third party not to leave its digital fingerprints on the data. That makes it virtually impossible for a dealership or third party not to leave its digital fingerprints on the data. Broadly interpreted, this implies that if you touch the data at any point then you may have acquired responsibility for what happens to the data at every point. The Challenge Ahead Ultimately, protecting data in the DMS is a shared obligation between the dealership, the DMS provider, the OEM, and third parties providing services for the dealership or OEM. In meeting that shared obligation, third-party providers and OEMs own the responsibility to verify which data fields they have accessed in the DMS, how it matches the data the dealership has authorized them to access, and what happens to the data once it leaves the dealership. In turn, dealerships own the responsibility to implement the technologies and employee practices that help safeguard secure access to data in the DMS. In the complicated and ever-changing world of privacy and data security: Consumers have the right to know how their personal and transaction information with the dealership is being safeguarded or used. Dealers have the right to know who is accessing what data in the DMS and how that data will be used and by whom. And the FTC has the authority to oversee and regulate both. That is the new world order. Visit to read more about how the automotive industry is changing. Bob Schaefer is vice president of Data Services at Reynolds and Reynolds. In that role, he and his team are responsible for the secure movement of data for all Reynolds products and services. During his 35-year career with Reynolds, he has led work in dealership management systems, dealer communications systems, and data integration structures. 6
7 Note: The content in this whitepaper is believed to be accurate but should not be construed as legal advice. Acknowledgements: Hackers Lurking in Vents and Soda Machines, Nicole Perlroth, New York Times, April 7, Heat System Called Door to Target for Hackers, Nicole Perlroth, New York Times, Feb. 5, Target Data Breach Gets Worse, 110 Million Shoppers At Risk, Laura Heller, Fierce Retail, Jan. 10, Target Says It Ignored Early Signs of Data Breach, Associated Press, March 14, The Privacy Challenges of Big Data: A View from the Lifeguard s Chair, Keynote address by FTC Chairwoman Edith Ramirez, Technology Policy Institute, Aspen Forum, Aug. 19, The FTC is Watching, Making Sure Dealers Keep Customers Private, Editorial, AutoRetailNet, Aug. 6, Prepared statement of the Federal Trade Commission, Privacy in the Digital Age: Preventing Data Breaches and Combating Cybercrime, before the Committee on the Judiciary, United States Senate, Feb. 4, Dealer Data Guidance, National Automobile Dealers Association memo to NADA Members, August 28, Published Statement of FTC Commissioner Brill, (Revised Aug. 15, 2011) The Reynolds and Reynolds Company. All rights reserved. 5/14
5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council
Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council 5.5 For the Year Ended December 31, 2013 Penetration Tests 5.5. Penetration Tests Table
BIG DATA AND INSURANCE SYMPOSIUM
BIG DATA AND INSURANCE SYMPOSIUM ATTORNEY GENERAL GEORGE JEPSEN UNIVERSITY OF CONNECTICUT SCHOOL OF LAW APRIL 3, 2014 (REVISED FOR PUBLICATION) *** This Article reproduces the keynote address delivered
YOUR HIPAA RISK ANALYSIS IN FIVE STEPS
Ebook YOUR HIPAA RISK ANALYSIS IN FIVE STEPS A HOW-TO GUIDE FOR YOUR HIPAA RISK ANALYSIS AND MANAGEMENT PLAN 2015 SecurityMetrics YOUR HIPAA RISK ANALYSIS IN FIVE STEPS 1 YOUR HIPAA RISK ANALYSIS IN FIVE
Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
F&I Best Practices and Performance Metrics
F&I Best Practices and Performance Metrics F&I Best Practices and Performance Metrics Driven by technology, legislation, regulatory scrutiny and changing customer expectations, both the F&I process and
The Promise of Industrial Big Data
The Promise of Industrial Big Data Big Data Real Time Analytics Katherine Butler 1 st Annual Digital Economy Congress San Diego, CA Nov 14 th 15 th, 2013 Individual vs. Ecosystem What Happened When 1B
TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the
For Release Upon Delivery 10:00 a.m., December 10, 2014 TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY Before the COMMITTEE ON BANKING, HOUSING,
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM
RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM SUMMARY OF OUR PROGRAM AND PROCESSES This dealership is committed to protecting its customers and itself from identity
Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:
Andrew M. Cuomo Governor Anthony J. Albanese Acting Superintendent FROM: TO: Anthony J. Albanese, Acting Superintendent of Financial Services Financial and Banking Information Infrastructure Committee
case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:
The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations
Reducing the cost and complexity of endpoint management
IBM Software Thought Leadership White Paper October 2014 Reducing the cost and complexity of endpoint management Discover how midsized organizations can improve endpoint security, patch compliance and
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
How To Protect Your Computer From Attack
FREQUENTLY ASKED QUESTIONS on C Y B E R S E C U R I T Y By IEEE USA s Committee on Communications Policy December 2011 This Frequently Asked Questions (FAQs) was prepared by IEEE-USA s Committee on Communications
Cyber Security and the Board of Directors
Helping clients build operational capability in cyber security. A DELTA RISK VIEWPOINT Cyber Security and the Board of Directors An essential responsibility in financial services About Delta Risk is a
Moderated by: Paul M. Schwartz Berkeley Law School Fourth Annual BCLT Privacy Forum March 13, 2015. Data Security Issues
Moderated by: Paul M. Schwartz Berkeley Law School Fourth Annual BCLT Privacy Forum March 13, 2015 Data Security Issues Roadmap I. Introduction: Data Security II. Top Three Data Security Issues or Trends
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution NOTICE This Technology Brief may contain proprietary information protected by copyright. Information
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
Secure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
PCI Compliance: Protection Against Data Breaches
Protection Against Data Breaches Get Started Now: 877.611.6342 to learn more. www.megapath.com The Growing Impact of Data Breaches Since 2005, there have been 4,579 data breaches (disclosed through 2013)
How to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 3: Using SSL Certificates in Microsoft Internet Information Server... 36 Ins talling SSL Certificates in IIS with IIS Manager... 37 Requesting
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
DMS Guide. Nowcom Corporation
DMS Guide Nowcom Corporation 2 Administration and Settings Dealer Center DMS allows you to manage your dealership settings in one location. 1. Click on the Admin icon and select dealer options. 4. Create
CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION
CDT ISSUE BRIEF ON FEDERAL DATA BREACH NOTIFICATION LEGISLATION January 27, 2015 A September 2014 Ponemon study found that 60% of U.S. companies have experienced more than one data breach in the past two
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
White Paper. Benefits and Challenges for Today s Online B- to- B Research Methodology. By Pete Cape, Director, Global Knowledge Management.
White Paper Benefits and Challenges for Today s Online B- to- B Research Methodology By Pete Cape, Director, Global Knowledge Management March 2015 Survey Sampling International, 2015 ABOUT THE AUTHOR
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
FOR THE FUTURE OF DATA CENTERS?
WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? A WHITEPAPER BROUGHT TO YOU BY SEI WHAT DOES THE CLOUD MEAN FOR THE FUTURE OF DATA CENTERS? files via the Internet to a hard drive located in a
Guided HIPAA Compliance
Guided HIPAA Compliance HIPAA Solutions for Office Managers and Practitioners SecurityMetrics We protect business Since its founding in 2000, privately-held SecurityMetrics has grown from a small security
Questions You Should be Asking NOW to Protect Your Business!
Questions You Should be Asking NOW to Protect Your Business! Angi Farren, AAP Senior Director Jen Wasmund, AAP Compliance Services Specialist 31 st Annual Conference SHAPE YOUR FUTURE April 23, 2013 Regional
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act
In a flurry of activity, the U.S. House of Representatives last week passed two cybersecurity information sharing bills. Both the House Intelligence Committee and the House Homeland Security Committee
Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
005ASubmission to the Serious Data Breach Notification Consultation
005ASubmission to the Serious Data Breach Notification Consultation (Consultation closes 4 March 2016 please send electronic submissions to [email protected]) Your details Name/organisation
PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION. Safeguarding Consumers Financial Data. Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS
PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION on Safeguarding Consumers Financial Data Before the COMMITTEE ON BANKING, HOUSING, & URBAN AFFAIRS SUBCOMMITTEE ON NATIONAL SECURITY & INTERNATIONAL TRADE
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
Memorandum! Is Big Data the right recipe for Europe?
has been around for years on account Ulrich Seldeslachts CEO, LSEC Leaders In Security (moderator) Data is a new class of economic asset; it s like currency, which means you have to do something with it
Open an attachment and bring down your network?
Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak
The Problems With SEC s Cybersecurity Approach
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] The Problems With SEC s Cybersecurity Approach Law360,
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter
The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter 1. In what ways do private entities currently share with, and receive from, the government cyber threat information?
A Pragmatic Guide to Big Data & Meaningful Privacy. kpmg.be
A Pragmatic Guide to Big Data & Meaningful Privacy kpmg.be From predicting criminal behavior to medical breakthroughs, from location-based restaurant recommendations to customer churn predictions, the
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
SC CAR DEALERSHIP ADVERTISING VIOLATIONS
Executive Update: SC Advertisement Violations View this email in your browser October 23, 2014 SC CAR DEALERSHIP ADVERTISING VIOLATIONS The South Carolina Department of Consumer Affairs has released statistics
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE
SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no
Understanding Professional Liability Insurance
Understanding Professional Liability Insurance Definition Professional liability is more commonly known as errors & omissions (E&O) and is a form of liability insurance that helps protect professional
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Federal Trade Commission Privacy Impact Assessment
Federal Trade Commission Privacy Impact Assessment for the: W120023 ONLINE FAX SERVICE December 2012 1 System Overview The Federal Trade Commission (FTC, Commission or the agency) is an independent federal
Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China
Hearing on Commercial Cyber Espionage and Barriers to Digital Trade in China June 15, 2015 Dirksen Senate Office Building Room 608 Washington, DC 20510 Paul M. Tiao Partner, Hunton & Williams LLP Testimony
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT
HOW TO COMPLY WITH THE GRAMM-LEACH-BLILEY ACT The information contained herein has been provided by Keith E. Whann and Deanna L. Stockamp of the law firm Whann & Associates and is for general information
THE UH OH MOMENT. Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk
THE UH OH MOMENT Financial Services Enterprises Focus on Governance, Transparency and Supply Chain Risk By Lois Coatney, Chuck Walker and Joseph Yacura, ISG Directors www.isg-one.com INTRODUCTION A top
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise
Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
