Microsoft, Windows, and Internet News - XML News Feed

Microsoft, Windows, and Internet News - XML News Feed - The Internet and Mobility News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.

If you wish to subscribe to this news feed the options that you have are:


Privacy Laws in the US

Privacy Laws in the US and Compliance Policy 

Privacy Laws in the USPrivacy laws already on the books are all overseen by a specific agency within the federal government, not by a single government authority. That’s because we don’t have a data privacy authority, whereas the EU countries all do. Without one, it would be very difficult to enforce a federal privacy law.

For example, COPPA exists to protect the privacy of children online, FERPA protects the privacy of students, HIPAA protects the privacy of patient data, and the FTC enforces consumer data privacy, to name a few.

In many ways we have an antiquated policymaking infrastructure. It’s a patchwork of controls that have no unifying principles and no unifying institutions to coordinate policy. In addition, we generating too much data. Think of all the IoT devices out there and the amount of data produced. Who is responsible for all that information? Our fitness trackers and smart watches, which it used as an example, hold a lot of personal and medical data, the kind of information that is in part covered by HIPAA and would be covered, theoretically, under a data privacy law, depending on which company held the data.

It makes little sense that protection of data should depend entirely on who happens to hold it. This arbitrariness will spread as more and more connected devices are embedded in everything from clothing to cars to home appliances to street furniture. Add to that striking changes in patterns of business integration and innovation — traditional telephone providers like Verizon and AT&T are entering entertainment, while startups launch into the provinces of financial institutions like currency trading and credit and all kinds of enterprises compete for space in the autonomous vehicle ecosystem - and the sectoral boundaries that have defined U.S. privacy protection cease to make any sense.

One overarching federal data privacy law is not necessary in my opinion and a working group of public and private agencies capable of helping both government and private businesses improve their data security practices would be far more beneficial.

Order Sensitive Information PolicyDownload Selected Pages Privacy Compliance Policy

- Privacy Laws in the US


Infromation glut key to long-term success

Right tools for IT Infrastructure for CIOs who want to create a world class IT function

The wealth of information at in an enterprise represents a truly unique advantage. It can offer insights into the lives of customers, their ambitions, their dreams, their needs and their challenges.

Importantly, this data can feed the analytics which guide the development of ever more personalised products and services for customers. Breaking down the silos of data, and creating more dynamic ways of accessing it, will make those companies who grab those challenges the standout prganizations of the future in an increasingly operating environment.

OrderIT Governance Infrastructure Strategy

Download Selected Pages IT Governance Infrastructure Strategy

- Infromation glut key to long-term success


Privacy Compliance Policy

Privacy Compliance Policy meets new California Privacy and GDPR mandated requirements

Privacy Compliance PolicyRight to privacy has been defined in two major pieces of legislation – one for the EU (GDPR) and the other in the California Privacy act which will take effect in 2020.

Order Sensitive Information PolicyDownload Selected Pages Privacy Compliance Policy

- Privacy Compliance Policy


Social Neworking Policy is missing in many companies

Electronic forms make implementing a Social Networking Policy easier

Social Networking PolicyAs of Januay 2018 Facebook has over 2.2 billion active users, 90% of which are outside of the United States.  The scope of the user base with the large numbers outside of the US create significant exposure to enterprises and companies of all sizes and types.

A social netwoking policy along with rules for how employees an associates of firms interact with the Internet is now a core requirement.

There are several such templates for a Social Networking Policies.  One of the best, as reported by the American Productivity Society is the one published by Janco Associates.

Read on...

Order social networking  Policy Download Selected Page  social networking  Policy

- Social Neworking Policy is missing in many companies


CIO Management Toolkit released

Top 10 CIO managment concerns are constantly changing

CIO Management ToolkitThe top 10 CIO concerns are:

  1. Security - as more instances of cyber-attacks are identified CIOs are well aware that their jobs are at risk if this occurs under their watch
  2. Staff Retention - During the past few years that has not been an issue but now with an improved IT job market staff will leave.
  3. Social Networks - This is the wave of the future and needs to be managed more effectively.
  4. Cloud Computing - This is the new hidden IT that is driving many new applications and is not under the complete control of the CIO and IT organization.
  5. Infrastructure - No longer are those interacting with the data and systems in a single location utilizing standard hardware and software.  Records management, retention and destruction as well as version control are just a few of the areas that CIOs need to manage and control.
  6. Consolidation - Islands of data and computing continue to exist as new technologies are implemented. Redundancy leads to disparate information and needs to be resolved.
  7. Big Data - As data is consolidated it needs to be analyzed more quickly so that decision making within the enterprise is improved.
  8. Automation - Traditional functions are now being eliminated and automation needs to take placed which will meet the strategic objectives of the enterprise.
  9. Mobile Computing - BYOD and mobile applications are where users are looking for support in order to improve their bottom line results.
  10. Succession Planning - Not only for the CIO role but for all of the other key roles within the IT functions. Job family definition is now a priority.

CIO Management Toolkit Read on Order CIO  Management Kit

- CIO Management Toolkit released


Chief Digital Officer (CDO) has an expanding role

CDO Job DescriptionChief Digital Officer (CDO) has an expanding role

Chief Digital Officer CDO's has responsibilities over governance, data risk and compliance that overlap with the duties of the Chief Security Officer (CSO). A new chief in the C-suite often triggers confusion, uncertainty, resistance and even conflict, says the CEO of Janco Assoiates, a technology and  infrastructure management consulting organication, which helps guide executive management meet these challenges.

Order Chief Digital Officer Job Description
- Chief Digital Officer (CDO) has an expanding role


Cost of Cloud Outage

Cost of Cloud Outage

Cost of Cloud OutageCost of outage is very expensive.  If a business has 50,000 customers and just 10% reach out to complain, that’s 5,000 complaints to address. That is a significant loss time and energy that could have been spent acquiring new customers and growing the business.

Those unhappy customers are also likely to share their less-than-positive experiences with friends and family, in person or through social media, and might move on to do business with competitors.

Experts estimate that the cost of losing critical applications is more than $5,000 per minute. Nearly 20% of the surveyed companies indicated losses of between $50,000 to over $5,000,000 after losing critical applications and/or data.

Order Cloud and Business Continuity PlanDownload Selected Pages
- Cost of Cloud Outage


Open Wi-Fi networks are a security risk

security risksSecurity Policy and Procedure Manual
Compliance Management Made Easy
ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant

Open wireless networks are a serious risk to users. Attackers can be sitting on the same networks use various techniques and hacker tools to sniff web traffic and hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.

Order Security Policies and ProceduresDownload TOC security policies

- Open Wi-Fi networks are a security risk