Locard’s Exchange Principle and the Daubert Test

Locard’s Exchange Principle and the Daubert Test Locard’s Exchange Principle is based on the precept that when people interact within an environment, they always leave traces of their activities. This is the basic principle of forensic science. In the digital and physical world, Locard’s Exchange Principle applies in that if people attempt to steal, remove, add, alter, or… Read More »

Greg Palmer

Information Security Policies, Standards, Procedures

Policies, Standards, Procedures – Information Security Governance Documents Information Security Governance documents consist of  policies, standards, and procedures. Policies are top-level governance documents that inform the organization of executive management’s information security direction and goals. Standards are just below policies and define the activities and actions as baselines needed to meet policy goals. Procedures are the lowest level… Read More »

Greg Palmer

Online Terms of Service Agreements in Contract Law

The Importance of Online Terms of Service Agreements in Contract Law Online Terms of Service agreements (TOS) found in contracts must have the following elements to be considered legal and enforceable: Parties to the contract must have the legal ability to enter a contract known as contractual capacity.  A contract can only be used for transactions that are… Read More »

Greg Palmer

The Concept of Safe Harbor and State of Texas Breach Notification Laws

The Concept of Safe Harbor The concept of “Safe Harbor” refers to specific actions, example; encryption of private data, that an individual or an organization can take to show a good-faith effort in complying with the law. This good-faith effort provides a person or organization “Safe Harbor” against prosecution under the law (Grama, 2015, pg.253). The State of… Read More »

Greg Palmer

Section 409 of the Sarbanes-Oxley Act (SOX)

Section 409 of the Sarbanes-Oxley Act (SOX) Section 409 of the Sarbanes-Oxley Act (SOX) states that organizations that are subject to SOX are required to disclose to the public, on an urgent basis, information on material changes in their financial condition or operations. The disclosures must to be presented in terms that are easy to understand and supported… Read More »

Greg Palmer

Health Information Privacy Complaint Consent

Health Information Privacy Complaint According to the Health Information Privacy Complaint Form OMB No. 0990-0269, Complaint Consent Form, The Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has the authority to collect and receive material and information about a complainant, including personnel and medical records may be relevant to an investigation of a person’s… Read More »

Greg Palmer

Access Control List – ACL, DACL, SACL, ACE

Access Control List – ACL, DACL, SACL, ACE Solomon (2014) states that an Access Control List (ACL) is a list of access control rules that can be applied to a specific object. ACL’s that are used in in Windows are considered discretionary so they are also known as Discretionary Access Control Lists (DACL).  DACL’s consists of one or… Read More »

Greg Palmer

Adobe Flash Player Vulnerabilities

Adobe Flash Player Vulnerabilities Zaharia (2015) states that over 3 million developers use Flash to create interactive content. Flash is primarily used to display text, graphics, and animations for video games and applications, allows audio and video streaming, and it can capture mouse, keyboard, microphone and camera input. Flash is deeply integrated into web browsers and is used… Read More »

Greg Palmer