First Reference company logo

Inside Internal Controls

News and discussion on implementing risk management

machine cogs image

data storage

Creating a BYOD policy for millennials, baby boomers and everyone in-between

Bring your own device (BYOD), in theory, is a beautiful thing. Employees are free to use their personal devices at work, allowing for more efficiency and flexibility. Not to mention that employers save on outfitting an entire company with PCs, phones and tablets, while at the same time getting a more reachable employee.

 

, , , , , , , , , , , ,

Good cybersecurity means good info governance

Cybersecurity: the word conjures up images of software engineers in lab coats feverishly analyzing cryptographic code in an effort to thwart an attack from a country somewhere on the other side of the globe. Seemingly daily reports of major data breaches are now coupled with warnings about a cybersecurity “talent gap,” meaning that there is […]

 

, , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Can customers be encouraged to read privacy policies?

When was the last time you read a privacy policy? I use dozens of online services—email, social networking, data storage, banking, photos, shopping, etc.—and I’ve only skimmed a couple. What does this mean for the companies that offer these services? Can they reasonably say that they have informed their users of the content of their policies, if most users simply click “Okay” without bothering to read the things?

 

, , , , , , , , , , , , , , ,

Destruction of information – do you know your obligations?

Here’s something you might want to know about: the Federal Government has introduced a law to impose stricter obligations with respect to information and security breaches.

 

, , , , , , , , , , , , , ,