• Grid View
  • List View
  • IT Best Practices - First "Safe Harbor" Approved for Children's Online Privacy Protection Act (Apr 2001)

    First “Safe Harbor” Approved for Children’s Online Privacy Protection Act (Apr 2001)

    In February 2001 The Federal Trade Commission announced that the Children's Advertising Review Unit of the Council of Better Business Bureaus (CARU), the children's arm of the advertising industry's self-regulatory program established in 1974, has been approved as the first "safe harbor" program under the terms of the Children's Online Privacy Protection Act. Safe harbor programs are industry self-regulatory guidelines that, if adhered to, are deemed to comply with the Act. This is the first COPPA safe harbor application approved by the Commission.

    May, 2002

  • IT Best Practices - The European Union's Privacy Initiatives (Jul 2000)

    The European Union’s Privacy Initiatives (Jul 2000)

    As the concern for privacy increases, governments around the world are working on legislation or have formed cross-border task forces to deal with privacy issues. We expect that the outcome of international privacy efforts will take several years to unfold and even longer to be implemented on a global basis. We also expect that national laws regarding privacy will continue to evolve around the world.

    May, 2002

  • IT Best Practices - Employee Email and Internet Use Policies

    Employee Email and Internet Use Policies

    Employees increasingly use email and the Internet while at work, both for work related purposes and frequently for personal use as well. The inability to distinguish between work and non-work related usage is sometimes problematic, and potentially exposes businesses to liability for a variety of claims from employees themselves, from clients, or even from third parties. Employers should be aware of the potential risks and of the measures that may help to decrease their exposure.

    May, 2002

  • IT Best Practices - Medical Privacy in an Electronic Age—A Discussion of the Issues

    Medical Privacy in an Electronic Age—A Discussion of the Issues

    As growing numbers of physicians, hospitals, pharmacies, and other health care providers start using the Internet to access patient records, increasingly large databases of patient information can be created and harvested. This trend towards quick and broad access to data has generated mounting public concern over the privacy and confidentiality of such information. Fortunately, technological tools exist which, if implemented, can actually provide greater security for electronic patient data than is generally available for paper-based records.

    May, 2002

  • IT Best Practices - Summary of Regulation/HHS Fact Sheet

    Summary of Regulation/HHS Fact Sheet

    Each time a patient sees a doctor, is admitted to a hospital, goes to a pharmacist or sends a claim to a health plan, a record is made of their confidential health information. For many years, the confidentiality of those records was maintained by our family doctors, who kept our records sealed away in file cabinets and refused to reveal them to anyone else. Today, the use and disclosure of this information is protected by a patchwork of state laws, leaving large gaps in the protection of patients' privacy and confidentiality. There is a pressing need for national standards to control the flow of sensitive patient information and to establish real penalties for the misuse or disclosure of this information.

    May, 2002

  • IT Best Practices - Press Briefing by Secretary Shalala, Sally Katzen (OMB), and Gary Claxton (HHS) at the White House, 12/20/00

    Press Briefing by Secretary Shalala, Sally Katzen (OMB), and Gary Claxton (HHS) at the White House, 12/20/00

    This report is a recap of the recent Department of Health press release regarding strong new consumer protections to ensure the privacy of medical records.

    May, 2002

  • IT Best Practices - Remarks by the President on Medical Privacy, 12/20/00

    Remarks by the President on Medical Privacy, 12/20/00

    This report is a recap of the President's remarks about the recent Department of Health press release regarding strong new consumer protections to ensure the privacy of medical records.

    May, 2002

  • IT Best Practices - EDI Practices in 2002 (May 2002)

    EDI Practices in 2002 (May 2002)

    Many people speculated that the Internet and the World Wide Web would be the death of EDI. Wrong! EDI is alive and well according to the 13th annual Information Systems and E-Business Spending study conducted by Computer Economics. EDI via direct dial connections with suppliers remains one of the most popular methods for organizations to exchange large amounts of data.

    May, 2002

  • IT Best Practices - Evolving From Best Practices to Good Practices (May 2002)

    Evolving From Best Practices to Good Practices (May 2002)

    The concept of best practices is another one of those difficult to define but widely adopted phrases used to describe one of the evolutionary steps in the ongoing pursuit of silver bullet fixes to complex organizational problems. Best practices is still lingering, but it is steadily being overshadowed by economics and the realities of organization dynamics. If the management mentality is to mature, it is important to learn from the phases of evolution. A social, political, and economic dissection of best practices is a healthy step in overcoming the syndrome.

    May, 2002

  • IT Best Practices - CFOs Want to Leverage IT (April 2002)

    CFOs Want to Leverage IT (April 2002)

    A survey of chief financial officers (CFOs) and finance directors shows that they view information technology (IT) as a value center, rather than as a cost center. The survey, conducted by CFO Research Services and sponsored by Getronics, also found that CFOs look at the Total Value of Ownership rather than Total Cost of Ownership when making IT investments.

    May, 2002

  • IT Best Practices - Computer Economics Joins the National Cyber Security Alliance (Apr 2002)

    Computer Economics Joins the National Cyber Security Alliance (Apr 2002)

    The National Cyber Security Alliance, a unique partnership between the federal government and leading private sector companies, continues to gain momentum. The Alliance’s Stay Safe Online Campaign website, www.staysafeonline.info, has received over 2 million hits since its launch in February 2002.

    May, 2002

  • IT Best Practices - Funding the Quest for Dependable Systems (April 2002)

    Funding the Quest for Dependable Systems (April 2002)

    Several programs at the National Science Foundation (NSF) and NASA are focused on the growing need for software-based systems that can be used with confidence (the systems will behave as expected and will do no harm). NSF anticipates spending $2,000,000 in FY 2002 to support research.

    May, 2002

  • IT Best Practices - Web Services Moving Toward Federated Authentication (May 2002)

    Web Services Moving Toward Federated Authentication (May 2002)

    The major concern of online shoppers remains the security of e-commerce sites. While the number of consumers willing to provide credit card numbers or personal information online continues to rise, the lack of easily used security measures remains an impediment to more rapid growth in those numbers.  Security requirements also extend to the necessity for nonrepudiation of transactions, so merchants can be assured that the online orders are valid and were made by the credit card owners.

    May, 2002

  • IT Best Practices - The Cost of Security Breaches (May 2002)

    The Cost of Security Breaches (May 2002)

    The sixth annual Computer Crime and Security Survey conducted by the Computer Security Institute (CSI) with the participation of the San Francisco Federal Bureau of Investigation's (FBI) Computer Intrusion Squad provides an updated look at the impact of computer crime in the United States.

    May, 2002

  • IT Best Practices - Checklist for Reporting a Computer Crime

    Checklist for Reporting a Computer Crime

    This article provides a checklist of practical steps to follow in the event that your systems are hacked or accessed by an unauthorized party. Actions include how to contact law enforcement, information to gather to assist in the investigation, and information to gather to determine damages. (2 pp.)

    May, 2002