<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[got privacy?&nbsp; Musings on the state of Privacy in a connected world. - Blog]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog]]></link><description><![CDATA[Blog]]></description><pubDate>Sun, 03 Sep 2023 01:05:57 -0700</pubDate><generator>Weebly</generator><item><title><![CDATA[Why Information Security (InfoSec) differs from Information Technology security (IT Security) ]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/why-information-security-infosec-differs-from-information-technology-security-it-security]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/why-information-security-infosec-differs-from-information-technology-security-it-security#comments]]></comments><pubDate>Tue, 12 Jul 2011 16:28:18 GMT</pubDate><category><![CDATA[security]]></category><category><![CDATA[weller]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/why-information-security-infosec-differs-from-information-technology-security-it-security</guid><description><![CDATA[Aaron Weller, CEO We live in an information age, where the answer to almost anything we think of (or *can* think) of is instantly available to us wherever we are. I am an Information Security Officer. My goal is to ensure as best as I can that data important to my users is available when required, has integrity and is only made available to people with a need to know, in line with laws and regulations and the assurances that my company has made to our customers and employees.Most organizations t [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph editable-text" style=" text-align: left; "><STRONG>Aaron Weller, CEO </STRONG>We live in an information age, where the answer to almost anything we think of (or *can* think) of is instantly available to us wherever we are. I am an Information Security Officer. My goal is to ensure as best as I can that data important to my users is available when required, has integrity and is only made available to people with a need to know, in line with laws and regulations and the assurances that my company has made to our customers and employees.<BR><SPAN></SPAN><BR><SPAN></SPAN>Most organizations these days have very complex technology &ldquo;plumbing&rdquo; that connects applications and systems and enable business processes. This plumbing consists of many &ldquo;pipes&rdquo;, &ldquo;connections&rdquo; and &ldquo;faucets&rdquo; (i.e. Technology Components), and &ldquo;water&rdquo; passing through this plumbing (i.e. Data).<BR><SPAN></SPAN><BR><SPAN></SPAN>Although ensuring that the pipes are in good order is important, these days every organization&rsquo;s plumbing is very complex and relies on pipes owned by third parties, some which are located in places that we do not control, and with many opportunities for leaks.<BR><SPAN></SPAN><BR><SPAN></SPAN>My job as an Information Security professional means that I need to care not only about the infrastructure but also about where the water is and who has access to it. In my role where the water is building up behind a dam, and who is drinking it are just as important as the pipes that it passed through to get into the reservoir.<BR><SPAN></SPAN><BR><SPAN></SPAN>In practical terms, this means that an Information Security professional needs to know not only where all of the &ldquo;pipes&rdquo; (networks), &ldquo;reservoirs&rdquo; (data stores) and &ldquo;faucets&rdquo; (access points) are and how they are protected and maintained, but also about the type and quality of water in each place. Just focusing on the technology often misses the context of what the organization has collected the information for in the first place.<BR><SPAN></SPAN><BR><SPAN></SPAN>In this context, personal information is be water that is not immediately drinkable but could be either cleaned (sanitized / scrubbed) or only used for certain purposes. Just like grey water can be used to water your garden, you wouldn&rsquo;t want to drink it, or have others drink it by mistake!<BR><SPAN></SPAN><BR><SPAN></SPAN>IT Security is just a part of the overall Information Security picture. It is a very important one, particularly for IT departments, but Information Security (and to an even greater extent, Information Privacy) focus on business processes and how data flows through them, whether in electronic or paper form. This helps Information Security professionals to understand where to spend their limited IT Security budgets to protect certain systems and types of devices where the most sensitive data resides or is processed.<BR><SPAN></SPAN><BR><SPAN></SPAN>Why should information be protected by a million dollar access system when it is on a server, but a dump of that same information into a spreadsheet can be downloaded onto a mobile device which is not owned by the organization and which may have very basic, or no, security controls at all?<BR><SPAN></SPAN><BR><SPAN></SPAN>I see it as absolutely vital that someone within organizations that I work with is available to have their primary focus on IT Security (or there is ready access to good consultants or outsourced services with those skills). But having a great suite of well configured tools and technical controls is not enough to manage the risks to organizations that are caused by their capture, processing and usage of sensitive data.<BR><SPAN></SPAN><BR><SPAN></SPAN>Getting the whole organization to understand what data is collected and why, how it can be used, and that it should be disposed of as soon as the costs of storing and protecting it exceed the business value of retaining it is vital to reducing the damage that could be done in the event of a data breach.<BR><SPAN></SPAN><BR><SPAN></SPAN>There have been many recent examples of organizations that retained sensitive data long past the point that it was of little value. This same data represented a significant (and avoidable) liability when a breach occurred. IT may be able to control access to a database, but by and large they are not able to impose tighter retention periods, or force tokenization, hashing or other controls on the business without either a regulatory or legal mandate, or a clear explanation of why the additional cost and effort is worth it.<BR><SPAN></SPAN><BR><SPAN></SPAN>So, if you are an IT Security professional, think about whether becoming an Information Security professional would be a good move, both for you and your organization. And if this isn&rsquo;t something that appeals to you, at least consider raising the point that someone should be looking at the water while you&rsquo;re running around fixing the pipes.<BR><SPAN></SPAN><BR><SPAN></SPAN>My biggest satisfaction has been when I start to hear that business leaders and other executives have started to ask the same questions that I do &ldquo;why are we capturing that data, and what are we going to do with it?&rdquo; Your customers are waking up and starting to ask similar questions. If you&rsquo;re going to be able to meet their changing expectations, you should have the answers ready.<BR><SPAN></SPAN><BR><STRONG>This article was originally published on <A title="" href="http://www.roer.com">www.roer.com</A> .&nbsp; Reproduced with permission.<BR><BR><SPAN></SPAN>Aaron Weller</STRONG></div>  ]]></content:encoded></item><item><title><![CDATA[How to get the most bang from your Conference buck.]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/how-to-get-the-most-bang-from-your-conference-buck]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/how-to-get-the-most-bang-from-your-conference-buck#comments]]></comments><pubDate>Wed, 17 Mar 2010 17:13:39 GMT</pubDate><category><![CDATA[conferences]]></category><category><![CDATA[Off-topic]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/how-to-get-the-most-bang-from-your-conference-buck</guid><description><![CDATA[A little bit off topic, but having just got back from RSA, and with a bunch of other conferences coming up, I thought I would share this checklist that&nbsp;I pulled together a while ago.&nbsp; Conferences&nbsp;are usually&nbsp;expensive, and you can miss out on many opportunities if you just attend the sessions and then go home. This checklist gives you some tips on how you can maximize the time that you spend at a conference and make sure that you walk away with more than just another folder f [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; "><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><FONT size=3><FONT color=#000000>A little bit off topic, but having just got back from RSA, and with a bunch of other conferences coming up, I thought I would share this checklist that&nbsp;I pulled together a while ago.&nbsp; Conferences&nbsp;are usually&nbsp;expensive, and you can miss out on many opportunities if you just attend the sessions and then go home. This checklist gives you some tips on how you can maximize the time that you spend at a conference and make sure that you walk away with more than just another folder for your shelf.</FONT></FONT></SPAN><br /><br /><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'; FONT-SIZE: 14pt"><FONT color=#000000>Before the Conference</FONT></SPAN></STRONG><br /><br /> <UL style="MARGIN-TOP: 0in" type=circle> <LI style="MARGIN: 0in 0in 0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Plan which sessions to attend.</SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Note who the speakers are for all of the sessions as well as the content (you generally have access to this information before the conference).<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Check for target clients, alliance partners and competitors and decide whether it&rsquo;s worth going to a presentation to be able to get to talk to someone from a key target, or to find out what they are doing.</SPAN></FONT></FONT><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><FONT color=#000000 size=3>&nbsp;</FONT></SPAN></STRONG>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Sort out your logistics.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Book flights that give you time to get to the conference allowing for flight delays.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>If the conference is in a hotel (and they often are), try to make sure that you stay in that hotel to a) get the special discounts that the conference will obtain for you and b) make it a lot easier for you to get between your room and the sessions.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Clear your &lsquo;to-do&rsquo; list.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Easier said than done, but taking conference calls during the sessions and working in the breaks means missing networking opportunities and not getting value for money.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Divide and Conquer.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Try to find out if anyone else from your company is attending the conference, make contact with them and try to split target sessions between you, compare notes etc.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><STRONG>Take a lot of business cards.</STRONG><SPAN style="mso-spacerun: yes"><STRONG>&nbsp;</STRONG>They're easy to carry, and if you don't use them, so what?</SPAN></SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l0 level1 lfo1; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Know what to say.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Sooner or later, someone will ask you about your company.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Work out what you are going to say about the firm and your role.</SPAN></FONT></FONT></LI></UL><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><FONT color=#000000 size=3>&nbsp;</FONT></SPAN></STRONG><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'; FONT-SIZE: 14pt"><FONT color=#000000>During The Conference</FONT></SPAN></STRONG><br /><br /> <UL style="MARGIN-TOP: 0in" type=circle> <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Timing is everything.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Try to be around in the general area before the sessions start and during breaks.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>You never know who you might meet, or what you might find out.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Be an Ambassador.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">If appropriate for the dress code, consider wearing branded (or otherwise 'conversation worthy' clothing so that you&rsquo;re noticeable).&nbsp; At RSA, a woman walked up to me and literally asked for the shirt off my back.&nbsp; Note: This is not always a good thing - and I do have witnesses!</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Work out what you want to get out of each session.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Do you want to talk to the speaker afterwards?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Would you like a demonstration?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>How does the session add to what you already know?</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Collect business cards.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">When you speak to someone, who you might want to contact again, be sure to collect a business card.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Write on the back a little about that person (business &amp; personal info), what you discussed and any other useful information to jog your memory when you get back.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Enter all vendor raffles.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">You never know what you might win.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Work the crowd. <SPAN style="mso-spacerun: yes">&nbsp;</SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Sit next to different people at each session and introduce yourself to them.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>If possible, review the attendee list and be strategic in who you sit next to.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l2 level1 lfo2; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Maintain a &lsquo;to do&rsquo; list.</SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Whenever something strikes you as interesting or you should follow up on, make sure you write it down and then action it when you return to your office.</SPAN></FONT></FONT></LI></UL><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><FONT color=#000000 size=3>&nbsp;</FONT></SPAN><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'; FONT-SIZE: 16pt"><FONT color=#000000>After the Conference</FONT></SPAN></STRONG><br /><br /> <UL style="MARGIN-TOP: 0in" type=circle> <LI style="MARGIN: 0in 0in 0pt; mso-list: l1 level1 lfo3; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Get business cards into your CRM system.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">A business card in your bag is not much use.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>In your company CRM system, it shows other people who come into contact with that person who else knows them.<SPAN style="mso-spacerun: yes">&nbsp;&nbsp;</SPAN></SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l1 level1 lfo3; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Follow up.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Write personalized emails where appropriate to people that you met, either sending them information that might be of value to them, or suggesting a follow up discussion or meeting.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l1 level1 lfo3; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Be timely.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Make follow-up calls / emails within a week of the end of the conference.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l1 level1 lfo3; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Keep your CPE certificate.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">You may be audited one day and be glad you did.</SPAN></FONT></FONT>  <LI style="MARGIN: 0in 0in 0pt; mso-list: l1 level1 lfo3; tab-stops: list .5in" class=MsoNormal><FONT size=3><FONT color=#000000><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Share your knowledge.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'">Tell other people in the office what you found interesting, and keep the course material in a place that other people can use it.</SPAN></FONT></FONT><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><FONT color=#000000 size=3>&nbsp;</FONT></SPAN><br /><br /><STRONG><SPAN style="FONT-FAMILY: 'Arial','sans-serif'"><FONT size=3><FONT color=#000000>Congratulations!<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>If you follow these steps then you will find that you get a lot more out of conferences, both for yourself and the company.</FONT></FONT></SPAN></STRONG></LI></UL></div>]]></content:encoded></item><item><title><![CDATA[Accessibility and Privacy.  A Zero Sum Game?]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/accessibility-and-privacy-a-zero-sum-game]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/accessibility-and-privacy-a-zero-sum-game#comments]]></comments><pubDate>Sun, 07 Mar 2010 03:39:10 GMT</pubDate><category><![CDATA[accessibility]]></category><category><![CDATA[privacy]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/accessibility-and-privacy-a-zero-sum-game</guid><description><![CDATA[While many organizations have a strong desire to make their web-sites useable and accessible for as many people as possible, most likely do not realize that this can result in some loss of privacy for users.Accessibility can work in a number of ways, either through active involvement by a user choosing certain options on the site, or passively without direct user interaction through good site design, color palette selection and similar.&nbsp; Where active involvement by a user is required, this  [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; "><FONT color=#000000 size=3 face=Calibri>While many organizations have a strong desire to make their web-sites useable and accessible for as many people as possible, most likely do not realize that this can result in some loss of privacy for users.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>Accessibility can work in a number of ways, either through active involvement by a user choosing certain options on the site, or passively without direct user interaction through good site design, color palette selection and similar.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Where active involvement by a user is required, this may be achieved either with them making a conscious choice at the time of using a site, or they may already have made a selection (e.g. choice of browser, screen resolution, use of screen reader) which is communicated to the site at the time of use.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>For users with disabilities, the availability of appropriate and useable accessibility options may mean the difference between them being able to use a site, or looking elsewhere.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>How this overlaps with privacy may not be immediately obvious.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Privacy refers to the amount of control that we have over our personal information, and how this is shared and used.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>On the Internet, Privacy can be taken to mean that you are aware of the information that you are sharing, and this information is used in a way that you are comfortable with until it is destroyed.</FONT><br /><br /><STRONG style="mso-bidi-font-weight: normal"><FONT color=#000000><FONT size=3><FONT face=Calibri>Browser Information Leakage</FONT></FONT></FONT></STRONG><br /><FONT color=#000000><FONT size=3><FONT face=Calibri>So how can accessibility compromise privacy?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>By knowing that a user is visually impaired, and combining that information with other information, for example that they are located in a certain area (from their IP address, or GPS or other location), you could compromise an individual&rsquo;s privacy.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Research has already indicated that between 63% and 87% of Americans can be uniquely identified by <SPAN style="COLOR: black; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin">birth date, gender and 5-digit zip code (see </SPAN></FONT></FONT></FONT><A href="http://www.citeulike.org/user/burd/article/5822736"><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri>here</FONT></SPAN></A><SPAN style="COLOR: black; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri> and </FONT></SPAN><A href="http://www.truststc.org/wise/articles2009/articleM3.pdf"><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri>here</FONT></SPAN></A><SPAN style="COLOR: black; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri> for the research and </FONT></SPAN><A href="http://www.eff.org/deeplinks/2009/09/what-information-personally-identifiable"><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri>here</FONT></SPAN></A><SPAN style="COLOR: black; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri> for some analysis by the Electronic Freedom Foundation).<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>If you&rsquo;re not convinced &ndash; check out the </FONT></SPAN><A href="http://panopticlick.eff.org/"><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3 face=Calibri>Panopticlick</FONT></SPAN></A><SPAN style="COLOR: black; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><FONT size=3><FONT face=Calibri> &ldquo;browser fingerprinter&rdquo;, also from the EFF.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>When I just tested my browser, its fingerprint was unique amongst nearly 800,000 configurations tested so far.&nbsp;</FONT></FONT></SPAN><br /><br /><STRONG style="mso-bidi-font-weight: normal"><FONT size=3><FONT face=Calibri><SPAN style="COLOR: black; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin">Logon Information Leakage</SPAN></FONT></FONT></STRONG><br /><FONT color=#000000 size=3 face=Calibri>Other accessibility options, such as reading text aloud, may be appropriate for an application being used at home, but may impact privacy if they are used in a location such as a library or a bank lobby, or may not even work if the appropriate hardware is not in place.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Developers must give thought to where a website may be used when developing privacy options, particularly when the website grants access to sensitive information.</FONT><br /><br /><STRONG style="mso-bidi-font-weight: normal"><FONT size=3><FONT color=#000000><FONT face=Calibri>How Privacy can impact Accessibility</FONT></FONT></FONT></STRONG><br /><FONT color=#000000 size=3 face=Calibri>Restrictions on sharing information about people&rsquo;s health and health conditions may impact the ability to plan appropriately accessible services for them.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>As a result, companies may not have the information that they need to know how to adapt their sites to their user base, reducing their ability to provide accessible information for all.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>While none of these issues are insurmountable, the fast evolving fields of Accessibility and Privacy mean that practitioners must be conscious of these areas when designing new applications as in many places there is no standard for managing the overlap of these two fields.</FONT><br /><br />&nbsp;</div><div ><div id="716806425244472" align="left" style="width: 100%; overflow-y: hidden;"></div></div>]]></content:encoded></item><item><title><![CDATA[How will you mark Data Privacy Day?]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/how-will-you-mark-data-privacy-day]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/how-will-you-mark-data-privacy-day#comments]]></comments><pubDate>Thu, 28 Jan 2010 04:40:29 GMT</pubDate><category><![CDATA[privacy]]></category><category><![CDATA[social networking]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/how-will-you-mark-data-privacy-day</guid><description><![CDATA[January 28th is Data Privacy Day.&nbsp; In a single generation, privacy concerns have shifted from worrying about who can see through your windows to who might be able to see your medical records on the Internet.&nbsp; Data Privacy Day gives us a chance to reflect on these changes, and to think about what steps we can take to better control personal information and manage our privacy.The fact is that information, from where you live to how you live, is now available to many companies that you do [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; "><FONT color=#000000 size=3 face=Calibri>January 28th is Data Privacy Day.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>In a single generation, privacy concerns have shifted from worrying about who can see through your windows to who might be able to see your medical records on the Internet.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Data Privacy Day gives us a chance to reflect on these changes, and to think about what steps we can take to better control personal information and manage our privacy.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>The fact is that information, from where you live to how you live, is now available to many companies that you do business with, or in some cases to everyone with an Internet connection.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN><SPAN style="mso-spacerun: yes">&nbsp;&nbsp;</SPAN>This disclosure can provide many benefits, from customized offers based on purchase history to a free cup of coffee on your birthday.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Disclosure also carries risks.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Many of us have received notices telling us that our personal information has been lost or stolen, and although most of these instances do not lead to direct harm to us individually, they often cause concern.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>Interestingly, the number one privacy concern that most people have is not related to the information that they share. Given the proliferation of social networking and other online activities, people are often comfortable (sometimes too comfortable) when it comes to sharing information in the public (or semi-private) domain. <SPAN style="mso-spacerun: yes">&nbsp;</SPAN>The real concern for many is how information that has been shared with trusted people or organizations will be managed and protected once is out of our direct control.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Individuals can reduce this risk by limiting what they share, but we also need to take responsibility for holding organizations to their privacy policies and agreements; they are stewards of your information.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>So to mark Data Privacy Day, here are 4 simple things that you can do to improve your own privacy:</FONT><br /><br /><FONT color=#000000><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><SPAN style="mso-list: Ignore"><FONT size=3 face=Calibri>1.</FONT><SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT size=3><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal">Think before sharing your personal information</STRONG>.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>For example, when a shop asks for your phone number at the checkout ask why they need it.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Usually the request is because they want a number that uniquely identifies you, rather than because they plan to call you.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>So, consider declining or just choose a generic number that you can remember.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Similarly, if someone asks for your birthday, then January 1st will often suffice.</FONT></FONT></FONT><br /><br /><FONT color=#000000><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><SPAN style="mso-list: Ignore"><FONT size=3 face=Calibri>2.</FONT><SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT size=3><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal">Always opt-out. <SPAN style="mso-spacerun: yes">&nbsp;</SPAN></STRONG>Unlike Europe, where you need to opt-in to consent to your data being shared, we in the U.S. have to ensure that we opt-out whenever we have the opportunity to restrict companies from sharing information with other companies or partners.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>It only takes a few seconds, and restricts what can be done with your information.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Find those boxes, and tick them.</FONT></FONT></FONT><br /><br /><FONT color=#000000><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><SPAN style="mso-list: Ignore"><FONT size=3 face=Calibri>3.</FONT><SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT size=3><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal">Treat Social Networks like coffee shops.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></STRONG>If you wouldn&rsquo;t talk about it in a coffee shop, don&rsquo;t talk about it on Facebook or Myspace.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>If you wouldn&rsquo;t shout it on a street corner, don&rsquo;t share it on Twitter!<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Once you have shared something electronically, it is out of your control, even if you think that only your friends will be able to see it.</FONT></FONT></FONT><br /><br /><FONT color=#000000><SPAN style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin"><SPAN style="mso-list: Ignore"><FONT size=3 face=Calibri>4.</FONT><SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT size=3><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal">Maintain Healthy Skepticism.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></STRONG>Be suspicious about any requests for personal information, even if they look like they come from a person or organization that you know.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Many people continue to be fooled by these requests.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>It&rsquo;s easy to take a couple of minutes to make a call and confirm that a request is genuine before providing information that could be used to commit identity theft, or cause you other problems. </FONT></FONT></FONT></div><div ><div id="173797864934957" align="left" style="width: 100%; overflow-y: hidden;"><SCRIPT type=text/javascript src="http://w.sharethis.com/button/sharethis.js#publisher=d9095659-f846-48c1-851d-8983d425d682&amp;type=website&amp;style=rotate"></SCRIPT></div></div>]]></content:encoded></item><item><title><![CDATA[Securing Virtual Worlds]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/securing-virtual-worlds]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/securing-virtual-worlds#comments]]></comments><pubDate>Mon, 18 Jan 2010 01:04:20 GMT</pubDate><category><![CDATA[hacking]]></category><category><![CDATA[social networking]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/securing-virtual-worlds</guid><description><![CDATA[If a tree falls in a virtual forest, does it make a virtual sound?&nbsp; These days, a lot of trees are falling in a lot of virtual forests and the noise is becoming louder in the real world.&nbsp; There are now university classes taught virtually, simulators replicate situations that are expensive or dangerous in real life and surgeons practice techniques virtually before they attempt the real thing. As Virtual Worlds (VW&rsquo;s) have become more complex and functional, they have become more v [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; "><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>If a tree falls in a virtual forest, does it make a virtual sound?<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>These days, a lot of trees are falling in a lot of virtual forests and the noise is becoming louder in the real world.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>There are now university classes taught virtually, simulators replicate situations that are expensive or dangerous in real life and surgeons practice techniques virtually before they attempt the real thing. </FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>As Virtual Worlds (VW&rsquo;s) have become more complex and functional, they have become more valuable, both to their users and to attackers.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Nearly half a million users spent money in Second Life, one of the most popular VWs, in August 2009.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Interestingly, over 1000 of these transactions exceeded $4000.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>The total GDP of Second Life was estimated at around $500m in 2007 &ndash; larger than some small countries.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>This increase in functionality and usage has also led to an increase in the number of people attacking the system or the people using it.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>While some early attacks focused on gaining control of in-world resources or disrupting the experience of other users, more recent attacks try to gain access to real world resources and bank accounts.</FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>While few corporations currently use VWs, it is likely that this will change over the next decade as they become more ubiquitous and gain Enterprise Class features to encourage their adoption.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>This will increase the urgency to develop a system of controls to protect both users and the environments themselves.</FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>So, as information security professionals, how can we help to make Virtual Worlds a better place to live and work?</FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>To help secure VWs from attack, it helps to think about them as a connected system with a number of components which can each be modeled.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>This helps us to understand what the attack surface looks like, and understand the key vulnerabilities and how they might be able to be defended against.</FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT face=Calibri><FONT color=#000000>The major vulnerability points are:</FONT></FONT></SPAN><br /><br /><FONT color=#000000><SPAN style="LINE-HEIGHT: 115%; FONT-FAMILY: Symbol; FONT-SIZE: 12pt; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol"><SPAN style="mso-list: Ignore">&middot;<SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal"><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi">Client Software.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi">Once you have installed code on a client machine, that code is vulnerable to being manipulated, either by changing the code itself or changing the way that it interacts with the VW server.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>This technique was used successfully to hack many online games and resulted in the development of programs such as PunkBuster which control which other programs can be running at the same time as the game client and performing checksums on key files to ensure their integrity.</SPAN></FONT></FONT><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT color=#000000 face=Calibri>&nbsp;</FONT></SPAN><FONT color=#000000><SPAN style="LINE-HEIGHT: 115%; FONT-FAMILY: Symbol; FONT-SIZE: 12pt; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol"><SPAN style="mso-list: Ignore">&middot;<SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal"><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi">The Virtual Environment.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN></SPAN></STRONG><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi">Whether it&rsquo;s performing a certain sequence of events that always produces game currency, or manipulating certain aspects of the VW to operate outside the rules (basically what the character Neo does in the film The Matrix), designers of the VWs are not able to predict every single way that a user might interact with the world, so they have to design safeguards that will work whatever the interaction is.&nbsp;</SPAN></FONT></FONT><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><FONT color=#000000 face=Calibri>&nbsp;</FONT></SPAN><FONT color=#000000><SPAN style="LINE-HEIGHT: 115%; FONT-FAMILY: Symbol; FONT-SIZE: 12pt; mso-fareast-font-family: Symbol; mso-bidi-font-family: Symbol"><SPAN style="mso-list: Ignore">&middot;<SPAN style="FONT: 7pt 'Times New Roman'">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; </SPAN></SPAN></SPAN><FONT face=Calibri><STRONG style="mso-bidi-font-weight: normal"><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi">The Users.</SPAN></STRONG><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt; mso-ascii-font-family: Calibri; mso-ascii-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-hansi-font-family: Calibri; mso-hansi-theme-font: minor-latin; mso-bidi-font-family: 'Times New Roman'; mso-bidi-theme-font: minor-bidi"><SPAN style="mso-spacerun: yes">&nbsp; </SPAN>One of the most common attack vectors seen to date is to exploit trust between users to the benefit of an attacker.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Most users tend to assume that if they have been interacting with another character in a virtual world for some time, that they can trust them.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>In reality, many of the cues that we get when interacting in person are masked when interacting with their avatar.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Both the appearance and actions of an avatar may be designed to elicit certain responses in the same way that con artists may take on a certain persona to achieve their goals.</SPAN></FONT></FONT><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt"><FONT color=#000000><FONT face=Calibri>Gaming VWs (e.g. World of Warcraft) are by their nature used by very competitive people who would be tempted by anything that might give them an advantage.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>This has enabled recent attacks to be successful by promising to show how to achieve or obtain certain things within the game world and then downloading malware which is used to steal credentials or set up backdoors on the user&rsquo;s machine.</FONT></FONT></SPAN><br /><br /><SPAN style="LINE-HEIGHT: 115%; FONT-SIZE: 12pt"><FONT color=#000000><FONT face=Calibri>While not a new phenomenon, attacks against VWs have been getting more attention as the technology becomes more mainstream and blended attacks result in real-world losses.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>As security practitioners, we need to understand the benefits and risks related to the use of VWs in our environments and set boundaries appropriately.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>It is likely that the use of VWs for business purposes will expand in the future, just as social networks have done.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Humans are social animals and these technologies provide new and fun ways to interact with our colleagues and clients.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>We just need to be aware that a virtual bear could be hiding behind every virtual tree and act accordingly.</FONT></FONT></SPAN></div><div ><div id="615781363205969" align="left" style="width: 100%; overflow-y: hidden;"></div></div>]]></content:encoded></item><item><title><![CDATA[Why “Gap” is a 4-letter word (part 1)]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/why-gap-is-a-4-letter-word-part-1]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/why-gap-is-a-4-letter-word-part-1#comments]]></comments><pubDate>Wed, 13 Jan 2010 17:52:05 GMT</pubDate><category><![CDATA[compliance]]></category><category><![CDATA[regulation]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/why-gap-is-a-4-letter-word-part-1</guid><description><![CDATA[One of the major problems that organizations face when they&rsquo;re reviewing their compliance program is understanding why they are doing what they are doing and how to achieve a &lsquo;steady state&rsquo; where compliance becomes part of the scenery rather than an ongoing struggle.&nbsp; For many organizations, this state seems to be receding ever further into the distance.&nbsp; Each year bring more controls that need to be implemented and monitored.&nbsp; Every gap analysis finds more gaps  [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; "><br /><br /><FONT color=#000000 size=3 face=Calibri>One of the major problems that organizations face when they&rsquo;re reviewing their compliance program is understanding why they are doing what they are doing and how to achieve a &lsquo;steady state&rsquo; where compliance becomes part of the scenery rather than an ongoing struggle.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>For many organizations, this state seems to be receding ever further into the distance.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Each year bring more controls that need to be implemented and monitored.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Every gap analysis finds more gaps and every effort at remediation appears to lead to little relief.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>Part of this issue is that for most organizations a &lsquo;gap analysis&rsquo; is about the worst thing that they could be doing.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>A &lsquo;gap analysis&rsquo; frames the situation to prejudice an outcome and rarely helps an organization get closer to a steady state of compliance.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Framing is a term from linguistics which describes how the choice of words activates certain emotions and thought patterns.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>With a &lsquo;gap analysis&rsquo; the framing works like this:<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Gaps are bad.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Analyzing and fixing gaps is good.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Having no gaps is best of all.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>However, in practice there are always more gaps to be found.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Existing gaps may reoccur in other forms or auditors will just dig deeper to find smaller and smaller gaps.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>But seeking to identify weak areas is good.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>It shows that we care about what is wrong.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>Therefore we should do gap analyses.</FONT><br /><br /><FONT color=#000000 size=3 face=Calibri>Even in organizations that are highly compliance focused, this approach doesn&rsquo;t make a lot of sense.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>It provides a never ending stream of &lsquo;remediation activities&rsquo; and &lsquo;refresh testing&rsquo; which keeps people employed and consultants in business, but it may or may not contribute to making organizations more secure or compliant.<SPAN style="mso-spacerun: yes">&nbsp; </SPAN>And after a point, there is not much point in being more compliant than is enough to achieve a particular sign-off or to provide a level of due care should an organization be sued.</FONT></div><div ><div id="186356195893955" align="left" style="width: 100%; overflow-y: hidden;"></div></div>]]></content:encoded></item><item><title><![CDATA[Man drives into post.  World gasps.]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/man-drives-into-post-world-gasps]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/man-drives-into-post-world-gasps#comments]]></comments><pubDate>Mon, 30 Nov 2009 23:29:49 GMT</pubDate><category><![CDATA[celebrities]]></category><category><![CDATA[surveillance]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/man-drives-into-post-world-gasps</guid><description><![CDATA[A man drives out of his own driveway and drives into a post.&nbsp; This story probably wouldn't even make the local paper unless it was a slow news day, but because the man in this particular situation was Tiger Woods, this has been front page news on both sides of the Atlantic.What reasonable expectation can celebrities have to privacy?&nbsp;&nbsp;What right to privacy should celebrities reasonably expect, in circumstances where they are involved in minor incidents that the rest of us would not [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; ">A man drives out of his own driveway and drives into a post.&nbsp; This story probably wouldn't even make the local paper unless it was a slow news day, but because the man in this particular situation was Tiger Woods, this has been front page news on both sides of the Atlantic.<br /><br />What reasonable expectation can celebrities have to privacy?&nbsp;&nbsp;What right to privacy should celebrities reasonably expect, in circumstances where they are involved in minor incidents that the rest of us would not expect to&nbsp;of real interest.<br /><br />As of this afternoon, Tiger has said that he won't be playing any more golf tournaments until 2010.&nbsp; I'm sure that he doesn't need the money, but unfortunately, this is likely to fan the flames even further.<br /><br />So - what expectations of&nbsp;privacy should anyone be able to expect in a situation like this.&nbsp;&nbsp;Have celebrities, by their very status, given up any expectation of privacy in any circle of life?&nbsp; It's interesting to&nbsp;ponder whether there is a sliding scale of privacy which is inversely proportional to how famous (or rich?) someone is.&nbsp; <br /><br />To me - that seems to be an equivalent of (<A href="http://en.wikipedia.org/wiki/Security_through_obscurity">Security Through Obscurity) </A>(call it Privacy Through Obscurity) which doesn't really sit very well.&nbsp; If we really want privacy to be protected we need to make sure that it is actively defended, rather than gradually eroded as someone becomes more "interesting".</div>]]></content:encoded></item><item><title><![CDATA[Privacy implications of Twitter Lists]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/privacy-implications-of-twitter-lists]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/privacy-implications-of-twitter-lists#comments]]></comments><pubDate>Tue, 03 Nov 2009 01:15:56 GMT</pubDate><category><![CDATA[social networking]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/privacy-implications-of-twitter-lists</guid><description><![CDATA[Twitter has recently rolled-out a new feature - the ability to create sub-groupings of people that you follow, and share them with other users.&nbsp; This has a number of useful benefits, including the ability to be able to group people into certain subject areas (for example, you might have a list of people that you work with, and another one for friends outside work).Let's start with the good privacy feature that has been build into the current version of lists - the ability to mark lists priv [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; ">Twitter has recently rolled-out a new feature - the ability to create sub-groupings of people that you follow, and share them with other users.&nbsp; This has a number of useful benefits, including the ability to be able to group people into certain subject areas (for example, you might have a list of people that you work with, and another one for friends outside work).<br /><br />Let's start with the good privacy feature that has been build into the current version of lists - the ability to mark lists private or public.&nbsp; This is a sensible idea and has been implemented in a way that is easy to use (although we would prefer it if the default was for lists to be private rather than public - but this does seem a little like splitting hairs!)<br /><br />Unfortuntely - the way that the lists have been set up currently&nbsp;are open to a number of forms of abuse.&nbsp; The primary reason for this is because a user does not have to authorize being added to a list.&nbsp; i expect that this is a useful (and necessary) feature for the top-ranked users, who could be added to hundreds or thousands of lists and would not want to have to accept every single request to add them.<br /><br />On the other hand - this does mean that people can add you to lists without your permissions - and some of the following could occur:<br /><br />1.&nbsp; You are added to a list that gives away some information which you didn't want shared (e.g. parents of XYZ Middle School) - this could be significant information leakage, dependent on which lists you are added to.<br />2.&nbsp; You are added to a list that isn't relevant to you (not so bad)<br /><SPAN>3.&nbsp; You are added to a list maliciously or acciedentally that is damaging to your reputation (e.g. Registered Sex Offenders)<br /><br />There needs to be a trade-off here.&nbsp; On one hand, we could subject everyone to "list spam" and render the feature next to useless.&nbsp; On the other hand, there could / should be some better tools to manage what lists you are on, and to remove yourself.<br /><br />Although lists "follow" you in the same way as people do - you can't seem to block the list, just the person who created the list.<br /><br />It's a brave new world out there.&nbsp; Would be interested to hear others experiences and thoughts on this.<br /></SPAN></div><div ><div id="511854648375721" align="left" style="width: 100%; overflow-y: hidden;"></div></div>]]></content:encoded></item><item><title><![CDATA[Privacy After Death]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/privacy-after-death]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/privacy-after-death#comments]]></comments><pubDate>Mon, 02 Nov 2009 22:39:19 GMT</pubDate><category><![CDATA[compliance]]></category><category><![CDATA[law]]></category><category><![CDATA[privacy]]></category><category><![CDATA[regulation]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/privacy-after-death</guid><description><![CDATA[Does someone's right to privacy end once they are dead?&nbsp; In the US, we do not have a constitutional right to privacy in the same way that Europeans do (yet!), but explicit provisions in HIPAA (Health Insurance Portability and Accountabilty Act) maintain that information about an indivudual should be maintained as private after their death, but other regulations such as the Freedom of Information Act may conflict in certain situations, in addition to free speech rights guaranteed under the F [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; ">Does someone's right to privacy end once they are dead?&nbsp; In the US, we do not have a constitutional right to privacy in the same way that Europeans do (yet!), but explicit provisions in HIPAA (Health Insurance Portability and Accountabilty Act) maintain that information about an indivudual should be maintained as private after their death, but other regulations such as the Freedom of Information Act may conflict in certain situations, in addition to free speech rights guaranteed under the First Amendment.<br /><br />In the EU, the right to personal privacy explicitly survives death <br /><br />Some interesting links around this subject can be found at:<br /><br /><A href="http://gcn.com/Articles/2004/07/30/InfoPolicy-Is-there-privacy-after-death.aspx" target=_blank>Is there privacy after death?</A><br /><A href="http://www.jsonline.com/news/waukesha/29378409.html" target=_blank>Privacy after death debated.</A><br /><br />Some more thoughts on this topic from Rebecca Herold&nbsp;(<A href="http://twitter.com/PrivacyProf/" target=_blank>@privacyprof) </A>who had written a couple of thought pieces around this topic <A href="http://www.jsonline.com/news/waukesha/29378409.html" target=_blank>here</A>&nbsp;and <A href="http://www.realtime-itcompliance.com/privacy_and_compliance/2009/09/privacy_for_the_deceased.htm" target=_blank>here</A></div><div ><div id="795781467869144" align="left" style="width: 100%; overflow-y: hidden;"></div></div>]]></content:encoded></item><item><title><![CDATA[To Google or not to Google?  That is the Ethical question.]]></title><link><![CDATA[http://www.chiefprivacyofficers.com/blog/to-google-or-not-to-google]]></link><comments><![CDATA[http://www.chiefprivacyofficers.com/blog/to-google-or-not-to-google#comments]]></comments><pubDate>Sat, 17 Oct 2009 17:22:50 GMT</pubDate><category><![CDATA[law]]></category><category><![CDATA[social networking]]></category><category><![CDATA[surveillance]]></category><guid isPermaLink="false">http://www.chiefprivacyofficers.com/blog/to-google-or-not-to-google</guid><description><![CDATA[Interesting article this week in the IAPPs Privacy Advisor&nbsp;which talks about the ethics of Googling someone, which got me to thinking.Even a couple of years ago - before social networks really caught on - this question wouldn't really have been asked.&nbsp; Unless you were a celebrity or information about you was available through other channels such as magazines - Google wouldn't have had a great deal of additional information to add.&nbsp; That has certainly changed over a relatively shor [...] ]]></description><content:encoded><![CDATA[<div  class="paragraph" style=" text-align: left; ">Interesting article this week in the IAPPs <A href="https://www.privacyassociation.org/index.php?option=com_content&amp;task=view&amp;id=1977&amp;Itemid=228" target=_blank>Privacy Advisor</A>&nbsp;which talks about the ethics of Googling someone, which got me to thinking.<br /><br />Even a couple of years ago - before social networks really caught on - this question wouldn't really have been asked.&nbsp; Unless you were a celebrity or information about you was available through other channels such as magazines - Google wouldn't have had a great deal of additional information to add.&nbsp; That has certainly changed over a relatively short period of time, particularly since Social Networks like Facebook started exposing more of the data that they had collected about people outside of their own network so that search engines could see it.&nbsp; Anyone who has tried to manage their Facebook privacy settings will know that these are far from being easy to use and it is easy to see how people unintentionally expose information to the world that they intended to keep just within a network of a few friends.<br />&nbsp;<br />Which brings us back to the Ethics of Googling someone.&nbsp; While this blog thinks that things that are posted onto the public Internet, such as this blog, are fair game for anyone to stumble upon or find, there are some types of information that people have an expectation to be kept private, which unfortunately is not always met.&nbsp; And then, there are to our mind the practices that are completely unreasonable invasions of privacy.&nbsp; <br /><br />The&nbsp;<A href="http://current.com/items/90228906_city-employers-asking-applicants-for-facebook-myspace-passwords.htm" target=_blank>worst example </A>that I've seen of this to date (although I'm sure there are others) was brought to our attention viaTwitter (thanks @ChristianVW for the heads-up).&nbsp; The City of Bozeman, Montana has decided that just doing a Google search on a potential employee is not enough.&nbsp; They have been asking for usernames and passwords to prospective employee's Facebook and other social networking accounts.<br /><br />The quote that I thought best summed up this sorry affair was prompted by a local radio station.&nbsp; "One thing that's important for folks to understand about what we look for is none of the things that the federal constitution lists as protected things, we don't use those," said attorney Greg Sullivan.&nbsp; Basically - give us access to everything and trust us to use it properly.<br /><br />Sorry - that doesn't cut it with us, and I suspect with a lot of readers of this Blog feel the same way.&nbsp; At a minimum, Bozeman should engage someone who actually does understand Internet and Privacy law and rethink how they run their background check process.&nbsp; Beyond that - anyone who has handed over any passwords should change them immediately.<br /><br />We'd be interested to hear of any other employers who are trying similar tactics.&nbsp; Please comment and let us know.</div><div ><div id="528499443441424" align="left" style="width: 100%; overflow-y: hidden;"></div></div>]]></content:encoded></item></channel></rss>