Agency wants enforcement over communications common carriers in data security

Federal Trade Commission wants enforcement powers over communications common carriers for data security and data breach issues.

Currently the FTC enforcement powers have an exemption for communications common carriers.

Inside Cybersecurity | FTC commissioners call for data-breach legislation, repeal of ‘common carrier’ exemption

TREND. Legislation. Curb Election Hacking. 4 Pieces Informed Intel

Legislation aimed at curtailing election machine hacking would:

  • require electronic machines to generate a paper trail
  • declare voting systems to be critical infrastructure
  • establish security standards
  • establish protocols for security failures

H.R. 6072 by Congressman  Johnson (D-GA)

SC Magazine | Rep. Johnson introduces bill designed to deter electoral hacking

 

Shortcut to the 3 Criticisms of State Financial Cyber Security Regulation

Critics lambast New York’s proposed financial cyber security regulations as:

  • unlikely to improve security at financial institutions
  • financial institutions need a consolidation of cyber security regulations at all governmental levels
  • this is nothing more than more paperwork and overregulation

CNBC | Critics are skeptical of New York’s proposed financial cybersecurity rules

 

Your Informed Intel on the 14th of September 2016:

Reg. Trends. Gov. & Banking Regulator. State Banking Cyber…

5 Cities. Transparency Trendsetters. Police Surveillance Technology.

Which 5 cities are first out of the gate to consider ordiannces to improve transparency in police surveillance?

  • New York City
  • Washington DC
  • Seattle
  • Milwaukee
  • Richmond

What does the coaltion of supporters look like?

  • privacy groups
  • civil libertians
  • civil rights groups
  • minority & ethnic groups

What technology is likely to be dislcosed?

Lege Trend: Agency Data Breach Means Agency Head Rolls.

The legislation: Cybersecurity Responsibility and Accountability Act of 2016 by Rep. Ralph Abraham, R-La.

What does it do?

  • If an agency has a data breach
  • Cause in whole or in part by the agency’s failing
  • (Cue eery music) The head of the agency gets das boot
  • Also prohibits agency head from getting “any cash or pay awards or bonuses for a period of one year” after a data breach

NEXTGOV | CYBER BILL WOULD LET AGENCY HEADS BE FIRED IF THERE’S A DATA BREACH

How Government Can Help Small Business with Data Security

The goal: Provide cybersecurity awareness and training programs for small businesses

The federal legislation: H.R. 5064 To amend the Small Business Act to allow small business development centers to assist and advise small business concerns on relevant cyber security matters, and for other purposes. 

SC Magazine | House plans vote on bill to improve small business cyber preparedness

Schools Access Kids Private Data. No Parental Consent. 3 Points of Informed Intel.

Scenario: School provides kid laptop/ipad. Kid uses laptop/ipad for school work and personal use.  School learns kid likes to watch YouTube at 3am and sleeps in class.

How can schools track students:

  • schools can access what programs/websites kids use
  • schools can access where the kids were when they used the laptop/ipad
  • some schools remotely monitor students through cameras on the devices

Are 3rd parties involved to monitor kids activity on school laptops/ipads? yes & they flag…

Business Trend. Allow Hackers to Hack your business. Improve Security.

Which car was hacked? Tesla Model S

Who did the hacking? Researchers

Does Tesla have a bounty program to report vulnerabilities? yes

What were the hackers able to control?  

  • sunroof
  • central display
  • door locks
  • braking system
  • activate the steering light
  • reposition the driver’s seat
  • windshield washers
  • open the trunk
  • fold in the side mirrors

PC World | Researchers hack Tesla Model S with remote attack