Deciding if You Should Use Your Personal Devices for Work
While it can be more convenient and add to your productivity to use your personal devices (computers, phones, etc.) for work, there are some risks to consider.
Read MoreMinimizing the Risks of a Lost Phone
If you’ve ever lost your phone or had it stolen, you know the feeling of panic that comes with it. Read More
Federal Agencies' Guidelines Regarding Notification by Financial Companies When a Security Breach Compromises Customer Data and Exposes Individuals to Identity Theft
Comments Submitted by:
Privacy Rights Clearinghouse
Consumers Union of U.S., Inc.
Consumer Action
PrivacyActivism
Submitted October 13, 2004 to:
Read MoreHearing on Data Breaches, Panel One: Data Breach Law and Identity Theft Prevention: Testimony to the U.S. Senate Judiciary and Banking Committees
Chairpersons Jackson and Correa, and members of the Senate Judiciary and Banking Committees:
Thank you for the opportunity to testify today on the topic of data breaches.
Read More
Medical Information Breach Regulations: Comments to the California Department of Public Health
December 13, 2010
TO:
Edwin Hoffmark
California Department of Public Health
PO Box 997377; MS 3201
Sacramento, CA 95899-7337
Submitted via email: RNUnit-at-cdph.ca.gov
Dear Mr. Hoffmark:
Read More
Using Peer-to-Peer Payments More Safely
Peer-to-Peer (P2P) payment services (PayPal, Venmo) enable you to easily send, receive or request payments to or from others. Read More