Information Security

I used this example with my Economic Crime Management grad class at Utica. There are several interesting information security issues at play here: First, the article highlights a need for proper information security policies concerning the device and who in the workplace has access to it beyond the primary copying function. Secondly, it emphasizes the need for policies surrounding the Personally Identifiable Information (PII) contained inside and how that is to be secured while in use and ultimately, how the machine, and the information inside, will be disposed of in a secure manner thus preventing the release of the PII to the general public. Lastly, on a non information security front… it is a great, and often overlooked, source of information which can be used effectively in internal investigations.