In today’s techno-saturated society, where devices are equipped with high quality cameras and microphones that can instantly share to the entire population of the Internet, we need to consider what is appropriate when using wearable technology. Wearable technology (also called wearable gadgets) is a category of technology devices that can be worn by a consumer and often include tracking information related to health and fitness.
Planning on purchasing a new iPhone 5s? Perhaps think twice about enabling the new fingerprint authentication offered by the device and iOS 7. And this time, it's not the hackers you should keep a lookout for.
From Wired magazine:
"There’s a lot of talk around biometric authentication since Apple introduced its newest iPhone, which will let users unlock their device with a fingerprint. Given Apple’s industry-leading position, it’s probably not a far stretch to expect this kind of authentication to take off. Some even argue that Apple’s move is a death knell for authenticators based on what a user knows (like passwords and PIN numbers).
We are pleased to announce Domain 12: Compliance, of our IU Information Security and Privacy Program.
Since the program is vast, like an encyclopedia, and can be difficult to digest at once, our "12 Domains in 12 Months" campaign encouraged the review of one domain per month -- in hopes to make it easier to study each domain's resources and gauge your local efforts towards meeting the objectives.
Do you sometimes need to verify that a person is who they say they are, prior to giving them information or access? Have you struggled with ways to do that? Now all the advice we could collect has been put together into one document on Identity Verification.
You'll find a description of different levels of identity verification so you can determine how hard you should work to verify an identity.
Information about these different types of verification is included:
In honor of Data Privacy Day 2013, Intel and Reed Elsevier are making the best-selling digital citizenship book, lol...OMG! available absolutely FREE (reg. $19.95) Jan 25 - 29, 2013.
Indiana University now has a number of short videos available for increasing the privacy awareness and expertise of our community.
You, too, can help promote privacy awareness during Data Privacy Month! Consider downloading, printing, and distributing these free posters. They are good examples of simple and attractive awareness material that helps promote privacy-aware (and secure) information handling practices.
Please feel free to print them out and post them in prominent locations, distribute them in mailboxes, or use in other creative ways!
It's a new year - a perfect time to make some resolutions to better protect your privacy, and that of those whose personal information you collect, store, and use at work. January is Data Privacy Month, with January 28 being celebrated around the world as International Data Privacy Day!
Here are some ways to refresh your knowledge about privacy-aware business and consumer practices this month:
Information Systems Acquisition, Development, and Maintenance - Domain 9 of the Information Security & Privacy Program
To celebrate the endorsement of the new IU Information Security and Privacy Program and to raise awareness of the Program, we are continuing a "12 Domains in 12 Months" awareness campaign. This month, we encourage you to study Domain 9: Information Systems Acquisition, Development, and Maintenance.
Our video for this domain features Jim Thomas, Director, Enterprise Business Systems in UITS.