article thumbnail

Judge’s Ruling May Provide Clues to the Outcome of Employee’s ‘Dropbox’ Privacy Suit

ARMA International

As summarized on Mondaq.com , Elizabeth Frankhouser, an employee of an educational facility, used her personal Dropbox account to store personal and workplace data. The account was password protected as well. There, he came upon the “borderline” photos and forwarded them to higher authorities in the school district.

Privacy 41
article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

Blackbaud provides data collection and maintenance software solutions for administration, fundraising, marketing, and analytics services to various charitable organizations, including healthcare, religious, and educational institutions as well as various foundations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Your Records Home by Curfew?

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Sorry to be the one to tell you, but “secure information” is an illusion. We protect our information, but we only create improvement, not assurance.

article thumbnail

Resolving Disputes During & Post COVID

Information Governance Perspectives

This is a company that has been doing business since 2011, but it’s only been in the past few years, as a result of COVID, and there free options, that you’ve seen them saturate every business market from professional services to education. You may have gotten an email from them asking you to reset your password. Passwords.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Organizations can help prevent their computers from becoming part of a botnet by installing anti-malware software, using firewalls , keeping software up-to-date, and forcing users to use strong passwords. Always change the default passwords for any IoT devices you install before extended use. Examples of Botnet Malware Attacks.

Phishing 105
article thumbnail

Why you should train your staff to think securely

IT Governance

The term also refers to the unwitting behaviour of improperly trained employees, or to the exploitation of inappropriately applied privileges and poor password practices by malicious outsiders. Staff need regular training on information security practices to ensure they’re aware of the risks they face on a daily basis.