Articles Posted in Information Security Newsletter

http://www.msisac.org/April 2009 Volume 2 Number 4.

From the Desk of David Badertscher

The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer records have been breached in the US over the past two years[1]. Many of these breaches involved credit card information. Continued use of credits cards requires confidence by consumers that their transaction and credit card information are secure. The following provides information as to how the credit card industry has responded to security issues and steps you can take to protect your information.

From the ABA Criminal Justice Section: http://www.abanet.org/crimjust

United States v. Hayes (No. 07-608)

“The court released an opinion regarding the prohibition on possession of a firearm by convicted felons to include persons convicted of a misdemeanor crime of domestic violence. Police officers discovered a rifle in respondent Hayes’s home. Hayes was charged with possessing firearms after having been convicted of a misdemeanor crime of domestic violence. He was previously convicted for battery in 1994 against his then-wife. Hayes moved to dismiss the indictment on the ground that his past conviction did not qualify as a predicate offense because West Virginia’s generic battery law did not designate a domestic relationship between aggressor and victim as an element of the offense. When the District Court denied the motion, Hayes entered a conditional guilty plea and appealed. The Fourth Circuit reversed, holding that a ยง922(g)(9) predicate offense must have as an element a domestic relationship between offender and victim.”

“What happens to your mission-critical… application source code should the vendor go bankrupt? This is when you need a Technology Escrow service.Tech Escrow requires vendors to deposit source code into an account held by a third party agent to ensure ongoing accessibility of the software. Recent research by IDG research Services highlights some recent trends and gaps in coverage, making the case for Technology Escrow.”

See: How to Minimize Risk with a Software Vendor ‘Prenup’ Paper by Digital Iron Mountain under sponsorship of IDG Research..

Contact Information