Emergency Preparedness for Local Governments

The Texas Record

Local Government Bulletin F outlines minimum and enhanced storage standards for records of permanent value and certain court documents. 2004). Disaster Resources Bulletin F Emergency Preparedness Local Governments

Documentation Theory for Information Governance

ARMA International

iv] Further, “the practices of government [and other public and private institutions] become formal or official to the extent that they are documented.” [v] This article aims to consider what a documentary focus can offer to the practices and understandings of information governance. This article’s documentary focus shows documentation’s central position in information governance and sheds light on the diverse kinds of documents and practices that deal with information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Kaspersky

InfoGovNuggets

Questions as to the Kaspersky antivirus software company were raised by military intelligence in 2004, well before the 2013 threat assessment issued Pentagon-wide. IT Security Information Value Governance Communications Duty of Care Controls Oversight Access Duty Government Supervision“Russian Firm Was Long Seen as Threat,” The Wall Street Journal , November 18, 2017 A2.

The Updates Must Go Through

Adam Shostack

In 2004, Microsoft shipped the Blaster removal tool to remove a virulent worm. And really, we do not want companies being told by governments to run code on people’s computers. Current Events government human factors Legal microsoft SecurityOn Monday, the Department of Justice announced that it had cleaned malware (“webshells”) off of hundreds of infected mail systems running Microsoft Exchange.

IT 46

Spam Kingpin Peter Levashov Gets Time Served

Krebs on Security

In this paid ad from 2004, Severa lists prices to rent his spam botnet. The government argued that under U.S. The government acknowledged that it was difficult to come to an accurate accounting of how much Levashov’s various botnets cost companies and consumers.

Tianfu Cup 2020 – 5 minutes to hack Windows 10, Ubuntu iOS, VMWare EXSi, and others

Security Affairs

11 out of 16 targets cracked with 23 successful demos: Chrome, Safari, FireFox Adobe PDF Reader Docker-CE, VMware EXSi, Qemu, CentOS 8 iPhone 11 Pro+iOS 14, GalaxyS20 Windows 10 2004 TP-Link, ASUS Router — TianfuCup (@TianfuCup) November 8, 2020.

Down under

InfoGovNuggets

Fine of $530 million proposed for bank who failed to catch transfers of money in and out of an account owned by someone who left the country (Australia) in 1999 (and who “had also been charged in Lebanon in 2004 with belonging to a terrorist organization…”). Compliance Compliance (General) Controls Corporation Definition Duty Governance Information Internal controls Requirements Third parties

What is ArchiMate?

erwin

Originally based on IEEE 1471 , ArchiMate was developed in the Netherlands as a joint venture between private industry and the Dutch Government between 2002 and 2004.

Up to Georgia 2,000 websites have been hit by cyber attacks

Security Affairs

” According to Georgia’s Interpress news agency, the hackers targeted the websites for Georgia’s general jurisdiction courts, government agencies, NGOs and media outlets. ” Mikheil was the third President of Georgia for two consecutive terms from 25 January 2004 to 17 November 2013. Saakashvili is wanted by Georgia’s new government on multiple criminal charges, which he decries as politically motivated.

The Great $50M African IP Address Heist

Krebs on Security

based researcher whose findings shed light on a murky area of Internet governance that is all too often exploited by spammers and scammers alike. That individual — Ernest Byaruhanga — was only the second person hired at AFRINIC back in 2004.

Kazakhstan wants to intercept all HTTPS Internet traffic of its citizens

Security Affairs

Bad news for citizens of Kazakhstan, the government is beginning to intercept all the encrypted traffic, and to do it, it is forcing them to install a certificate. The Kazakhstan government is beginning to intercept all the encrypted traffic and to do it is forcing users in the country to install a certificate. The certificates are issued in compliance with the Law on Communications 2004 passed in November 2015.

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Hailing from Portland, Oregon, Exterro launched in 2004 and specialized in workflow-driven software and governance, risk, and compliance (GRC) solutions.

EU : New SCCs published

DLA Piper Privacy Matters

The New SCCs repeal the existing SCCs (dating from 2001, 2004 and 2010) and aim to address the entry into force of the General Data Protection Regulation (“ GDPR ”) and the decision of the European Court of Justice (“ CJEU ”) in Schrems II.

GDPR 56

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

In 2004, CIA and Mossad requested help to the the Dutch intelligence to get access to the plant, only in 2007 the mole, who posed as a mechanic working for a front company doing work at Natanz, dropped the virus into the target systems. “[T In 2004, Mossad and the CIA asked for help from AIVD. Symantec researchers discovered that the Stuxnet code was updated over time, in May 2006 and in February 2007, when the Iran’s government began installing the centrifuges at Natanz.

Top Database Security Solutions for 2021

eSecurity Planet

Available as an on-premises or cloud solution, Cloudera’s platform is secured by an integrated set of security and governance features dubbed Shared Data Experience (SDX).

Cloud 78

Sandboxing: Advanced Malware Analysis in 2021

eSecurity Planet

Sandboxing can detect the newest and most critical threats, foster collaboration, minimize risks, and facilitate IT governance. Antivirus protection isn’t enough to protect against today’s advanced threats.

Evaluating the GCHQ Exceptional Access Proposal

Schneier on Security

Australia, and elsewhere -- argue that the pervasive use of civilian encryption is hampering their ability to solve crimes and that they need the tech companies to make their systems susceptible to government eavesdropping. It's actually a positive contribution to the discourse around backdoors; most of the time government officials broadly demand that the tech companies figure out a way to meet their requirements, without providing any details.

Library History with Heritage & University Archives, Part 2

Archives Blogs

The school’s name was changed once more in 2004 to the College of Information. By 1973, Strozier library contained 1,150,000 volumes, 500,000 government documents, 93,000 maps, and a collection of micromaterials exceeding 700,000.

CILIP announces Honorary Fellowships including Library Champion Bobby Seagull

CILIP

Her portfolio includes advising young entrepreneurs, and supporting and advising organisations on governance and advising those, in particular women and BAME or LGTBQ+ people, who wish to embark upon board careers. CILIP announces Honorary Fellowships including Library Champion Bobby Seagull.

Library and Archives Canada’s journey of discovery: modernising our digital preservation infrastructure using Preservica

Preservica

The institution has a combined mandate for libraries and archives as a result of a merger of Canada’s national library and public archives in 2004. This content includes the nation’s published heritage acquired through legal deposit, records of the federal government, private papers of historically significant Canadians, and the Government of Canada Web Archive.

The British Library?s International Library Leaders Programme

CILIP

Created in 2004, Library and Archives Canada (LAC) combines the collections, services and staff of both the former National Library of Canada (established in 1953) and the National Archives of Canada (established as the Dominion Archives in 1872). The British Library?s

Former PIDB Member Steven Garfinkel passes

Archives Blogs

Garfinkel entered government service with a distinguished academic record, after attending both George Washington University and its Law School as a Trustee Scholar. From 2000 to 2006, he chaired the Nazi War Crimes and Japanese Imperial Government Records Interagency Working Group (IWG) , the vast declassification initiative to implement the Nazi War Crimes Disclosure Act of 1998. From 2004 to 2008, appointed by President George W.

Predictions 2012: #1 – On Twitter and Media

John Battelle's Searchblog

2012 is going to be a year of contrasts – of consolidation of power for the Internet Big Five , and fragmentation and disruption of that power due to both startups as well as government and consumer action. 2004 Predictions. 2004 How I Did. I’ve spent the past few weeks jotting down thoughts for 2012, and hope to do the Year That Is About To Be justice in the following set of posts.

Predictions 2012 #6: “The Corporation” Becomes A Central Societal Question Mark

John Battelle's Searchblog

Corporations are arguably the most powerful institutions in human history, more powerful than all but the largest governments. 2004 Predictions. 2004 How I Did. Amidst all the chaos, tragedy, and tumult that was 2011, I noticed one very clear theme: Most of us are struggling with the role corporations play in our society. The 14th Amendment (yes, the one that banished slavery) established corporations, in the US, as “persons” in the legal sense.

IT 68

It’s Not Facebook’s Fault: Our Shadow Internet Constitution

John Battelle's Searchblog

Back in the heady days of 2004 to 2010 – not very long ago – a riot of innovation had overtaken the technology and Internet world. Our lack of consideration deliberately aided and abetted the creation of a unratified shadow Constitution for the Internet – a governance architecture built on assumptions we have accepted, but are actively ignoring. Those of us fortunate enough to have lived through the birth of the web have a habit of stewing in our own nostalgia.

IT 70

Predictions 2012: #2 – Twitter As Free Radical, Swiss Bank, Arms Merchant…And Google Five Years Ago

John Battelle's Searchblog

And that has to do with the concept of openness and the need for third party validation in the eyes of government and consumer scrutiny. 2004 Predictions. 2004 How I Did. My predictions this year will be pretty focused on the Internet Big Five (Google, Microsoft, Apple, Amazon, and Facebook) but the first two focus on Twitter. Because Twitter is poised to become a critical “free radical” whose presence affects the actions of all the Big Five players.

IT 65

European Parliament Announces New European Data Protection Supervisor

Hunton Privacy

He will replace Peter Hustinx, who has been the EDPS since 2004. The EDPS’s authority stems from Regulation 45/2001 , which governs the processing of personal data by EU institutions. On November 27, 2014, the European Parliament announced that it will appoint Giovanni Buttarelli as the new European Data Protection Supervisor (“EDPS”), and Wojciech Wiewiórowski as the Assistant Supervisor.

Weekly podcast: Uber, Tether, Bitcoin and Western Union

IT Governance

Hello and welcome to the IT Governance podcast for Friday, 24 November 2017. Graham Cluley writes on Tripwire that, “As part of a deal with the US Justice Department and Federal Trade Commission (FTC), Western Union has now agreed to pay more than half a billion dollars (an eye watering $586 million) to individuals who lost money via Western Union money transfer scams between January 1, 2004 and January 19, 2017.”.

French Data Protection Authority Elects New Chair

Hunton Privacy

From 2001 to 2010, she was Chair of the French Internet Rights Forum ( Forum des Droits sur l’Internet ), a private body supported by the French government to address concerns about online activities. Falque-Pierrotin has been a member of the CNIL since 2004, and has been Deputy Chair since February 2009.

MY TAKE: What it takes to beat cybercrime in the age of DX and IoT: personal responsibility

The Last Watchdog

Back in 2004, when I co-wrote this USA TODAY cover story about spam -spreading botnets, I recall advising my editor to expect cybersecurity to be a headline-grabbing topic for a year or two more, tops. Year-in and year-out, criminal innovation has far outpaced the effort on the part of companies and governments to defend their business networks, as well as to preserve the sanctity of our private data.

IoT 100

President Obama Nominates Ohlhausen to be FTC Commissioner

Hunton Privacy

Ohlhausen previously worked in various senior positions at the FTC, most recently as Director of the FTC’s Office of Policy Planning from 2004 to 2008 where she headed the FTC’s Internet Access Task Force. As reported in BNA’s Privacy Law Watch , on July 19, 2011, President Obama announced his intention to nominate Maureen K. Ohlhausen to the Federal Trade Commission. Obama sent his official nomination to the Senate on July 21, 2011.

California’s AG is Not Happy with the State’s New Consumer Privacy Act: Data Privacy Trends

eDiscovery Daily

The UCL’s civil penalty laws were enacted by the voters through Proposition 64 in 2004 and cannot be amended through legislation,” Becerra wrote. Becerra’s beefs with the Consumer Privacy Act foreshadow the fights that are looming over the state’s sweeping digital information law as interests, including those in government, push to alter its reach and enforcement before it goes into effect in 2020.

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA governs how businesses treat “consumer” “personal information.” Below is a summary of each exemption, as adopted and amended: Health Information Exemption: The CCPA, as adopted, exempts “protected or health information” collected by a covered entity pursuant to the CMIA or governed by the privacy, security, and breach notification rules issued by the Department of Health and Human Services (45 CFR Parts 160 and 164), established pursuant to HIPAA.

Halfway Through The Year: How’re The Predictions Doing?

John Battelle's Searchblog

However, the company is the target of several government probes, and it remains to be seen how its perceived early missteps might play out. Related: Predictions 2011 2011: How I Did Predictions 2010 2010: How I Did 2009 Predictions 2009 How I Did 2008 Predictions 2008 How I Did 2007 Predictions 2007 How I Did 2006 Predictions 2006 How I Did 2005 Predictions 2005 How I Did 2004 Predictions 2004 How I Did.

Attacks Targeting Oil and Gas Sector Renew Questions About Cybersecurity

Hunton Privacy

However, the attack comes on the heels of an FBI and Department of Homeland Security (“DHS”) alert warning of Russian attempts to use tactics including spearphishing, watering hole attacks, and credential gathering to target industrial control systems throughout critical infrastructure, as well as an indictment against Iranian nationals who used similar tactics to attack private, education, and government institutions, including the Federal Energy Regulatory Commission (“FERC”).

The Future of War (From Jan., 1993 to the Present)

John Battelle's Searchblog

The most notable of these continuing operations is the not-so-covert war in Pakistan, where the United States has carried out more than 300 drone strikes since 2004. … Can governments really exercise national military power – kick ass, kill people – merely by using some big amps and some color monitors and some keyboards, and a bunch of other namby-pamby sci-fi “holodeck” stuff?

The Good, Bad, And The Ugly: Key Takeaways From California’s New Privacy Law

Privacy and Cybersecurity Law

The CCPA governs how businesses treat “consumer” “personal information.” Below is a summary of each exemption, as adopted and amended: Health Information Exemption: The CCPA, as adopted, exempts “protected or health information” collected by a covered entity pursuant to the CMIA or governed by the privacy, security, and breach notification rules issued by the Department of Health and Human Services (45 CFR Parts 160 and 164), established pursuant to HIPAA.

Predictions 2021: Disinformation, SPACs, Africa, Facebook, and a Return to Tech Optimism

John Battelle's Searchblog

Everyone’s talking about how it’s about time for the government to step up and do something , but I’m deeply cynical about anything changing in 2021. 2004 Predictions. 2004 How I Did.

Mayhem Moves To Production With The Department Of Defense

ForAllSecure

To put it in perspective, the first autonomous car challenge was in 2004. For example, we work with multiple units within the Navy -- some have a cybersecurity mission, some are doing DevOps, and some are doing test and evaluation to make sure what the government buys is fit for purpose.

Mayhem Moves To Production With The Department Of Defense

ForAllSecure

To put it in perspective, the first autonomous car challenge was in 2004. For example, we work with multiple units within the Navy -- some have a cybersecurity mission, some are doing DevOps, and some are doing test and evaluation to make sure what the government buys is fit for purpose.