INFORMATION

Site Map - Proprietary Information Protection

Intellectual property

- (LeJeune v. Coin Acceptors, Inc., Maryland Court of Appeals, No. 111, 2004)

What They Know Can Hurt You

- Companies can follow these steps to categorize and protect confidential information from theft by insiders.

The New Forensics: Investigating Corporate Fraud and the Theft of Intellectual Property

- One fascinating chapter explores the disposition of a bank account dormant since the Holocaust and how forensic investigators cracked the case 60 years after the fact. It describes how a large group of investigators went to Switzerland to determine the beneficiaries of dormant World War II-era Swiss bank accounts. The chapter details methodology used to retrieve documents and to discover what was hidden and who was entitled to it.

Copyright

- A federal appeals court has ruled that file-sharing software, such as Grokster, does not infringe on the copyright of entertainment providers. In its ruling, the court noted that new technology always disrupts established markets but that "time and market forces" often balance the interests of the various players. MGM has appealed to the U.S. Supreme Court, which has agreed to hear the case. (MGM et al v. Grokster, U.S. Court of Appeals for the Ninth Circuit, No. 03-55894, 2004)

Open Debate on Open Source

- What are the benefits of using free and open-source software (FOSS) rather than a proprietary software product? And what are the risks? These questions are examined by the Federal Deposit Insurance Corporation (FDIC) in a guidance letter to financial institutions.

Open Debate on Open Source

- What are the benefits of using free and open-source software (FOSS) rather than a proprietary software product? And what are the risks? These questions are examined by the Federal Deposit Insurance Corporation (FDIC) in a guidance letter to financial institutions.

Information security

- On the authority of a 2000 law that amends the Atomic Energy Act of 1954, the Department of Energy (DOE) has issued regulations that will allow the department to impose civil penalties on contractors for breaches of information security.

IP report

- Intellectual property piracy report issued by U.S. Trade Representative.

Electronic Records Management

- To reduce liability, companies must know how to manage electronic records and how to respond to electronic discovery requests.

Here’s No Free Lunch

- Before accepting government funding to help develop or build a security product, companies must understand how it could alter their intellectual rights to the product.

Information security

- A bill (S. 500) introduced by Sen. Bill Nelson (D-FL) would regulate information brokers and would allow individuals to bring civil lawsuits against companies that fail to protect consumer data. A companion bill (H.R. 1080) has been introduced in the House by Rep. Edward Markey (D-MA). The House version has 13 cosponsors and has been referred to the House Energy Committee’s Subcommittee on Commerce, Trade, and Consumer Protection.

Market Forces vs. Legislation: What’s Your View?

- In the wake of multiple high-profile thefts of consumer information, the protection of personal data held in business databases has become a hot topic. Some legislators have introduced bills that would hold companies liable for inadequately guarding sensitive data as one way to encourage greater security. @   What is your view? Should a hybrid approach, like SEC filing, be sought? Should the government take stronger action, holding companies responsible for data breaches? Or should, in Crews’ words, “industry norms and practices…secure the ends that regulation can only mimic”? Technofile wants to know your opinion. E-mail your comments to ppiazza@asisonline.org.

Information Brokers

- The California Assembly’s Insurance Committee has voted down a bill (S.B. 550) that would have required any companies, before selling personal information to investigators, to certify the legitimacy of those clients and provide the subject of the inquiry with a copy of the information being given out.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.