Microsoft, Windows, and Internet News - XML News Feed
Microsoft, Windows, and Internet News - XML News Feed - The Internet and Mobility News feed is an XML news feed that you can subscribe to and re-publish on your web site or blog. The only requirement that you need to meet is that the feed is included with no modifications and that the links within the feed are retained as is.
If you wish to subscribe to this news feed the options that you have are:
Privacy Laws in the US
Privacy Laws in the US and Compliance Policy
Privacy laws already on the books are all overseen by a specific agency within the federal government, not by a single government authority. Thats because we dont have a data privacy authority, whereas the EU countries all do. Without one, it would be very difficult to enforce a federal privacy law.
For example, COPPA exists to protect the privacy of children online, FERPA protects the privacy of students, HIPAA protects the privacy of patient data, and the FTC enforces consumer data privacy, to name a few.
In many ways we have an antiquated policymaking infrastructure. Its a patchwork of controls that have no unifying principles and no unifying institutions to coordinate policy. In addition, we generating too much data. Think of all the IoT devices out there and the amount of data produced. Who is responsible for all that information? Our fitness trackers and smart watches, which it used as an example, hold a lot of personal and medical data, the kind of information that is in part covered by HIPAA and would be covered, theoretically, under a data privacy law, depending on which company held the data.
It makes little sense that protection of data should depend entirely on who happens to hold it. This arbitrariness will spread as more and more connected devices are embedded in everything from clothing to cars to home appliances to street furniture. Add to that striking changes in patterns of business integration and innovation traditional telephone providers like Verizon and AT&T are entering entertainment, while startups launch into the provinces of financial institutions like currency trading and credit and all kinds of enterprises compete for space in the autonomous vehicle ecosystem - and the sectoral boundaries that have defined U.S. privacy protection cease to make any sense.
One overarching federal data privacy law is not necessary in my opinion and a working group of public and private agencies capable of helping both government and private businesses improve their data security practices would be far more beneficial.Privacy Laws in the US
Infromation glut key to long-term success
Right tools for IT Infrastructure for CIOs who want to create a world class IT function
The wealth of information at in an enterprise represents a truly unique advantage. It can offer insights into the lives of customers, their ambitions, their dreams, their needs and their challenges.
Importantly, this data can feed the analytics which guide the development of ever more personalised products and services for customers. Breaking down the silos of data, and creating more dynamic ways of accessing it, will make those companies who grab those challenges the standout prganizations of the future in an increasingly operating environment.Infromation glut key to long-term success
Privacy Compliance Policy
Privacy Compliance Policy meets new California Privacy and GDPR mandated requirements
Right to privacy has been defined in two major pieces of legislation one for the EU (GDPR) and the other in the California Privacy act which will take effect in 2020.Privacy Compliance Policy
Social Neworking Policy is missing in many companies
Electronic forms make implementing a Social Networking Policy easier
As of Januay 2018 Facebook has over 2.2 billion active users, 90% of which are outside of the United States. The scope of the user base with the large numbers outside of the US create significant exposure to enterprises and companies of all sizes and types.
A social netwoking policy along with rules for how employees an associates of firms interact with the Internet is now a core requirement.
There are several such templates for a Social Networking Policies. One of the best, as reported by the American Productivity Society is the one published by Janco Associates.Social Neworking Policy is missing in many companies
CIO Management Toolkit released
Top 10 CIO managment concerns are constantly changing
CIO Management Toolkit released
- Security - as more instances of cyber-attacks are identified CIOs are well aware that their jobs are at risk if this occurs under their watch
- Staff Retention - During the past few years that has not been an issue but now with an improved IT job market staff will leave.
- Social Networks - This is the wave of the future and needs to be managed more effectively.
- Cloud Computing - This is the new hidden IT that is driving many new applications and is not under the complete control of the CIO and IT organization.
- Infrastructure - No longer are those interacting with the data and systems in a single location utilizing standard hardware and software. Records management, retention and destruction as well as version control are just a few of the areas that CIOs need to manage and control.
- Consolidation - Islands of data and computing continue to exist as new technologies are implemented. Redundancy leads to disparate information and needs to be resolved.
- Big Data - As data is consolidated it needs to be analyzed more quickly so that decision making within the enterprise is improved.
- Automation - Traditional functions are now being eliminated and automation needs to take placed which will meet the strategic objectives of the enterprise.
- Mobile Computing - BYOD and mobile applications are where users are looking for support in order to improve their bottom line results.
- Succession Planning - Not only for the CIO role but for all of the other key roles within the IT functions. Job family definition is now a priority.
Chief Digital Officer (CDO) has an expanding role
Chief Digital Officer CDO's has responsibilities over governance, data risk and compliance that overlap with the duties of the Chief Security Officer (CSO). A new chief in the C-suite often triggers confusion, uncertainty, resistance and even conflict, says the CEO of Janco Assoiates, a technology and infrastructure management consulting organication, which helps guide executive management meet these challenges.Chief Digital Officer (CDO) has an expanding role
Cost of Cloud Outage
Cost of Cloud Outage
Cost of outage is very expensive. If a business has 50,000 customers and just 10% reach out to complain, thats 5,000 complaints to address. That is a significant loss time and energy that could have been spent acquiring new customers and growing the business.
Those unhappy customers are also likely to share their less-than-positive experiences with friends and family, in person or through social media, and might move on to do business with competitors.
Experts estimate that the cost of losing critical applications is more than $5,000 per minute. Nearly 20% of the surveyed companies indicated losses of between $50,000 to over $5,000,000 after losing critical applications and/or data.Cost of Cloud Outage
Open Wi-Fi networks are a security risk
Security Policy and Procedure Manual
Compliance Management Made Easy
ISO 27000 / HIPAA / SOX / CobiT / FIPS 199 Compliant
Open wireless networks are a serious risk to users. Attackers can be sitting on the same networks use various techniques and hacker tools to sniff web traffic and hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.Open Wi-Fi networks are a security risk