Globally, countries and organizations now recognize the need for a unified approach for managing IT infrastructure services, says Marlin Pohlman of the Cloud Security Alliance. The trick is developing this new set of global standards.
"No one up here wants to stop Apple or Google from doing the incredible things that you do," Sen. Al Franken says. "What today is about is trying to find a balance between all of those wonderful benefits and the public's right to privacy."
The bill would establish a framework that allows consumers not to have their online activities tracked and, with limited exceptions, prohibits online providers from doing so if that's what individuals choose.
The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.
Personalized medicine research, which relies on genetic information paired with electronic health records, could pave the way for many treatment breakthroughs. But because of the sensitive nature of the information involved, pioneers in this field must take extra privacy and security precautions.
Among the many subjects the Privacy and Security Tiger Team will tackle in the weeks ahead is determining whether more guidelines are needed on the issues of accommodating corrections to electronic health records and ensuring data integrity.
An incident recently added to the official federal list of major health information breaches offers a reminder that dental practices, as well as medical practices, must adequately protect patient records.