You didn’t need to go far in this morning’s paper to find information governance-related news items.
- “U.S. Says Chinese Professors Stole Tech,” Wall Street Journal, May 20, 2015 A1. Professor arrested for allegedly stealing wireless technology from two US companies and then using it in China to make equipment for sale to the Chinese military.
- “Debit-Card Data Theft At ATMs Is Soaring,” Wall Street Journal, May 20, 2015 A1. Dramatic rise in capture of withdrawal information, including passwords, at ATM machines.
- “Clinton’s Staff Kept Tight Rein On Documents,” Wall Street Journal, May 20, 2015 A1. Allegations that chief of staff interfered with normal process by which FOIA staff decides which documents are to be withheld.
Plus one on page B1: “Bug Exposes Broad Security Flaws,” Wall Street Journal, May 20, 2015 B1. Engineers tweak the systems to fix security flaw, but cause certain websites to virtually disappear.
Controlling access to sensitive data is a major component of information governance as companies have a duty to take reasonable steps to protect their assets. And to take reasonable steps to prevent people from stealing your information. And the government needs to avoid the appearance of allowing political interference in the Freedom of Information Act process. And when protection of the internet is worked out between engineers trying to do their best, stuff happens. [Lord, forfend, that the government gets involved.]