A consultant colleague recently reached out with some questions on how to craft a good organizational information security policy. I’ve got experience with this, as a graduate-level legal instructor, ...
The objective of Brandeis University (“University”) in the development and implementation of this comprehensive written information security policy (“WISP”) is to create effective administrative, ...
Data serves as the lifeblood of most businesses today, and safeguarding its security is imperative. I believe this commitment is not merely an obligation to uphold ethical and legal standards; it also ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
The University at Buffalo Information Security Office maintains an Information Security Incident Response Plan providing a framework which ensures information security incidents are managed ...
The FBI is in the midst of a major rewrite of the security policy that sets minimum criteria for how its criminal justice information is protected. With the revamp, the bureau is aiming to make sure ...
Back in 2006, British mathematician Clive Humby stated that data was the new oil. Like oil, data isn’t useful in its raw state and must be refined, processed, and distributed to deliver value. Nearly ...