unix and linux operating commands

Interpreting the Law

 
Thread Tools Search this Thread
# 1  
Old 10-08-2008
Interpreting the Law

In the never-ending battle against identity theft, a proactive event recently took place in Texas: a company was charged with improperly dumping patient records. This was discovered before any actual identity theft was reported.

Per the Texas 2005 Identity Theft Enforcement and Protection Act: "A business shall implement and maintain reasonable procedures, including taking any appropriate corrective action, to protect and safeguard from unlawful use or disclosure any sensitive personal information collected or maintained by the business in the regular course of business. A business shall destroy or arrange for the destruction of customer records containing sensitive personal information within the business's custody or control that are not to be retained by the business by: (1) shredding; (2) erasing; or (3) otherwise modifying the sensitive personal information in the records to make the information unreadable or undecipherable through any means."

But there something that still bothers me about this act--the technical details. For example:

  1. Shredding: cross-cut or strip cut?
  2. Erasing: low-level multi-pass erase, zero out the data, or just delete the files?
  3. Modifying sensitive data: change just the name and SSN, or include data of birth, address and any account numbers?
How an organization complies with this act and makes "the information unreadable or undecipherable through any means" remains open to interpretation. And that's the problem. Throwing strips of sensitive data into the dumpster instead of the actual documents isn't much of an improvement.

Organizations want to elicit the services security professional (e.g. a CISSP) to properly safeguard and dispose of their sensitive data, and to meet their legal obligations. Otherwise, they may be giving themselves a false sense of security.


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

Check "A law" or "Mu law"

Does anyone know how to check if a .wav file is encoded with "A law" or "Mu law" in Linux and PC? I tried sox --i filename.wav on my PC, but I don't think it tell you if the file is A law or Mu law. Thanks. (2 Replies)
Discussion started by: learnix
2 Replies

2. Shell Programming and Scripting

Need help interpreting a function

Hi, i was reading through a sample coding and came across this function, can anyone pls help to interpret the code for me. Thank alot find_lines() { res=-1 if ; then grep -i "$@" $FILENAME res=$? fi return $res } (2 Replies)
Discussion started by: Cheranime
2 Replies

3. UNIX for Advanced & Expert Users

vmstats interpreting

We are having performance issues on an alpha4100 server. I can't paste a snapshot of my vmstat in here, but... We have 4gb of memory. The actual memory stays consistant around 306k. Free is dropping into the 120 area. Wire is around 206k consistantly. consistantly. My manual says that unix... (3 Replies)
Discussion started by: MizzGail
3 Replies

4. UNIX for Dummies Questions & Answers

Shellscript Interpreting

I am trying to interpret the following shellscript and am having a very difficult time. Could one of you Unix gurus pleasssseeee help me out? You just won't know how much of a life saver you would be for me. PN=`basename "$0"` # Program name VER=`echo '$Revision: 1.2 $' | cut -d' ' -f2` ... (3 Replies)
Discussion started by: Ann
3 Replies

5. UNIX for Dummies Questions & Answers

Interpreting netstat -s

Are there any references I can look up for to interprete "netstat -s", especially those on TCP statistics. (6 Replies)
Discussion started by: deaniyoer
6 Replies
Login or Register to Ask a Question