The CPU of information governance

There’s lot of discussion of information governance. The top two factors, based on the volume of discussion, are Compliance and Protection. There cover what steps you need to take to comply with applicable law and corporate policy and what steps you need to take to protect the information you have. The third factor, less discussed, is Use – what do you collect and how do you collect it, and how do you use and reuse that information to make money.

This post is about Protection.

“Federal Agents Pierce Web-Anonymity Tool,” Wall Street Journal, April 1, 2014 A6 http://on.wsj.com/1pERRgl

A web anonymizer, Tor, is apparently not as secure as we were led to believe. Or maybe it is. Does it hide your web travels from the Feds?

If you have employees who use Tor, is that a sign of a sick canary in the coal mine? Is it just to protect you and your company’s information from Uncle NSA?

Advertisements

Leave a comment

Filed under Business Case, Controls, Internal controls, Privacy, Protect assets, Protect information assets, Risk

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s