What if, while searching the Internet, you come across a Facebook profile of one of your employees, including inappropriate pictures and personal remarks on the supervisor? What does this mean to you as an employer? And what can you do about it?
There's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants - they also can be abused.
Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
On Jan. 14, a new workgroup advising federal regulators dug into the difficult task of figuring out whether a presidential council's recommendations for electronic health record interoperability are feasible.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
Healthcare privacy and security issues rose to the forefront in 2010 thanks, in large part, to the HITECH Act, which led to many new regulations as well as a public list of major health information breaches.
When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
Mobile banking and social networks are expected to pose new security threats in the payments space; and one small-business advocate says it's time for regulatory reform to solve the corporate account takeover problem.
Mobile banking and social networks are expected to pose new security threats in the payments space; and one small-business advocate says it's time for regulatory reform to solve the corporate account takeover problem.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.