Encrypt, protected, pay or prohibit the cost!
In the past several days, important news programs and innumerable online news programs reported two incidents of stolen or lost notebooks containing personal data of countless people. The initial theft included a laptop laptop downloads by a Veterans Affairs worker. The missing data in this instance contains Social Security numbers.
That notebook contained the personal information, such as credit card data, of approximately 243,000 clients of Hotels.Com who’d reserved areas between 2002 and 2004.
Based on The Register, a British tech news website, password security was the sole security on a number of those notebooks dropped by Ernst & Young during a previous incident, which any enthusiastic computer user understands could be readily compromised. What about the notebooks recently lost by Ernst & Young workers? Was the information in those notebooks encrypted? Are there any business policies restricting the degree of private data that may depart the workplace where presumably network safety criteria and firewall security are set up? Are there some business rules forbidding employees from departing notebooks unattended (though you’d think common sense could be sufficient )? Or , are there principles banning the transfer of private information to worker laptops? I expect there are not. If any such steps were set up, Ernst & Young’s public relations folks would have plastered that over the media to guarantee customers and the general public in an effort to conserve the company’s corporate derriere.
Ernst & Young and the VA aren’t the only entities which have lost notebooks with private information, and the majority of these entities have developed a normal response directly from the Corporate Playbook. There is no reimbursement for somebody who might need to shell out possibly years clearing up a consequent bad credit history. Anyone who has been in the position of needing to prove they don’t owe a debt they don’t owe will let you know . If they offered to cover legal fees for anybody needing to clear resulting poor credit historiespay state penalties for prosecution of identity thieves, then that may be considered compensatory. When they committed to and executed a program to secure and encrypt the information , in particular, illegal downloading of private data to mobile computers in the first place, which would be considered the best transfer of all.
Workers of the auditing businesses don’t appear to care what happens to your data. You may just see how which may happen. They are in Miami at Still Another conference. The convention is in a Caribbean resort they have been to a few times. They are knowledgeable about the resort and the place so they feel a little sense of false safety. Someone is talking for hours of converting sales, pushing certain divisions, or their firm’s new data recovery centre which will assist customers feel more”secure.” Are not they coming back into the area for the next half of this seminar? Can they ask whether the conference area will be locked through lunch? Certainly not. They are company notebooks. What is a few lost notebooks to some huge corporation like Ernst & Young.