Data Encryption Software: RockYou Sued After Data Breach.

RockYou, a developer of online applications and services–such as slideshow apps and games for Web 2.0 sites like Facebook and MySpace–has been named in a class action lawsuit this past Monday.  Among the complaints lies the fact that RockYou did not use encryption like AlertBoot to safeguard personal information against data breaches. Will RockYou have […] read more

PHIPA Encryption Checklist.

The factsheet published by the Information and Privacy Commissioner of Ontario (May 2007), contains a checklist on the use of encryption for health information, as a well a detailed explanation of the different types of encryption that can be used to secure data. I thought I’d go over the checklist, and make some comments (you […] read more

Data Security: PSU Alerts 30,000 Of Data Breach.

Penn State University has a potential data breach on their hands–and not because of a stolen computer that lacked drive encryption software such as AlertBoot.  In this case, it’s malware that’s causing the (potential) problem. Letters Sent Out December 23 On December 23, databreaches.net posted news that Penn State was sending out data breach notification letters […] read more

Data Encryption On Cell Phones Broken?.

While you won’t have to do it often, there will probably be a point in your lifetime when you’ve got to upgrade your data encryption software.  And, I emphasize, you won’t have to do it often, perhaps never at all, but you will have to when required…or suffer the consequences. It seems to me that […] read more

An Alternative To Deleting Data? The Rfiddler Looks Cool, Sounds Cool, Perhaps Can Do The Job.

You know, there’s zapping data and then there’s zapping data.  I’ve often noted how disk encryption software can be used to securely toss used hard drives (as opposed to destroying the drives or degaussing them), but encryption is not exactly fun, is it? Hence, I present you with the rfiddler, a RFID frying gun that’s […] read more

Drive Encryption Software: Canada’s PHIPA Requires The Use Of Encryption On Mobile Health Data.

The Durham data breach from last week (and reported earlier this week) has been met with incredulity by the Ontario Information and Privacy Commissioner.  A directive to use data encryption has been issued, prohibiting the transfer of sensitive data if encryption is not used. As you’ll recall, the loss of a USB key meant the […] read more

Data Encryption Software: Northern Ireland Department of Finance and Personnel Loses 12 Laptops.

The Information Commissioner’s Office has a formal undertaking with the Department of Finance and Personnel (DFP) of Northern Ireland.  The department lost 12 laptops, none of them secured with drive encryption. (Otherwise, there would be no need for an undertaking.)  Two Laptops, 37,000 People Of the 12 laptops stolen, two of them contained personal data […] read more

Laptop Encryption Software: MBNA Contractor Loses Credit Card Data.

MBNA, the largest credit card provider in the UK, has announced a data breach due to the theft of a laptop computer.  Data encryption software like AlertBoot was not used to protect the information, it looks like. Thousands Affected The breach, while announced by MBNA, actually stems from the actions (or, rather, the lack of […] read more

Laptop Data Encryption For SMBs – Small And Medium Sized Businesses.

Data encryption for SMBs: It’s an issue that bears looking into because of the upcoming compliance requirements with Massachusetts’s 201 CMR 17.00 legislation (aka the “data breach laws”). While there are many aspects to cover under 201 CMR 17.00–including the protection of paper documents under lock–perhaps the issue that has raised the most ruckus is […] read more

Disk Encryption Software: Durham, Canada Health Department Has 80,000 Data Breach.

A clinic in Durham, Canada–just north of Toronto–has suffered a data breach that affects 83,524 people who’ve received flu shots, H1N1 as well as seasonal, between October 23 and December 15.  Hard disk encryption was not used to secure the information, although it was mentioned that “the ability to read that data is limited.” What […] read more