Quantcast
Channel: Jay Heiser » Policy
Browsing all 10 articles
Browse latest View live

Yes, we CAN be arrested

Earlier this week, the Guardian reported the arrest of Mark Hanna, News International’s head of security.  While details are vague, it appears to be the case that the UK justice system is accusing him...

View Article



It is against our policy to commit sabotage

A significant number of enterprise IT policies include some sort of prohibition against the use of computer viruses, interference with the network, and other forms of deliberate harm.  Is it really the...

View Article

You may not write down unmemorizable passwords

I frequently see end user policies that contain the following two elements: Passwords must be so complex that they cannot be guessed Passwords may not be written down This is almost a model case of...

View Article

SaaS is a Simon Says World

When you buy SaaS, you get what is written on the box.  Well, you get what is written on the virtual box. That text may consist of page after page of dense legalese that puts a higher level of emphasis...

View Article

Has ‘you must obey the law’ ever actually worked?

Its not that I am categorically against the idea of law, but I am convinced that your typical corporate counsel is more motivated by personal convenience than by a sense of organizational proportion. I...

View Article


Do Your Lawyers Actually Know What the Law Is?

It is only Wednesday, and already I’ve reviewed at least 3 different policies that require employees to obey applicable laws. This is not just self-evident—its a professional cop-out. Somebody doesn’t...

View Article

Why today’s stock market is inherently unreliable

If you wanted to sabotage a trading system, you might set out to design suicide mechanisms that look very much like today’s automated trading mechanisms.  Blaming Knight Capital’s screwed pooch on...

View Article

Including, but not limited to

Any time your internal policies include the lawyerly language “Includes, but not limited to…”, it should be a sign that somebody needs to reexamine the text.  This is often a sort of cop out, an...

View Article


Hack back, jack?

It would be the rare soul indeed, who, after spending hours or even days cleaning up from a hack, didn’t feel the strong red rage of revengeful urges. And how many PC owners or site managers, still...

View Article


Why do you classify?

Gartner clients have a lot of questions about the topic of data classification. It is a primary concept that has long been enshrined in the canon of computer security, yet in practice, it remains a...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images