BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Well-Intentioned Employees Can Make Poor Judgment Calls

Posted May 8, 2012    Peter McCalister

In 2007, Google’s Street View project began to collect “payload data” including e-mail addresses, text messages, and passwords from unsecured Wi-Fi networks of potentially hundreds of millions of people. More than a dozen countries began investigations of Street View in 2010 and in the United States, the Justice Department, the Federal Trade Commission, state attorney generals and the F.C.C. began looking into the matter.

On April 13, 2012 The Federal Communications Commission released a report on Google’s Street View project after a 17-month investigation. The initial viewpoint was the data collection was a result of a “rogue” engineer operating on his own. That however, has been revealed to be false. According to the report, the engineer suggested it was entirely intentional: “We are logging user traffic along with sufficient data to precisely triangulate their position at a given time, along with information about what they were doing.”

Google responded in a blog saying, “The project leaders did not want, and had no intentions of using, payload data.” In addition, Google stressed that the engineer started the project on his “20 percent” time – time that Google gives to employees to work on their own initiatives.

So how did this happen? A Google executive says, “Quite simply, it was a mistake.” Marc Rotenberg, executive director of the Electronic Privacy Information Center says, “This is what happens in the absence of enforcement and the absence of regulation.”

Sometimes well-intentioned employees make poor judgment calls, putting their company in a compromising situation. Proper regulations, especially when employees are empowered to work on their own initiatives, can prevent media frenzy, or as in this particular case, an investigation for potentially breaking privacy laws.

Leave a Reply

Additional articles

PowerBroker Password Safe Password Age Report

Reshaping Privileged Password Management with Password Safe 5.2

Posted July 21, 2014    Martin Cannard

Today, we’re pleased to unveil the latest edition of our privileged password management solution, PowerBroker Password Safe. I’ll start with a brief intro of what’s new and then tell you a little about the driving factors behind Password Safe development. New features for mitigating password risk and ensuring accountability enterprise-wide Here’s the 10,000-foot overview of…

Tags:
, , ,
PowerBroker for Windows tamper protection

PowerBroker for Windows 6.6 Tamper Protection

Posted July 18, 2014    Morey Haber

I have a bone to pick: Stopping an administrator from performing an action on a system is futile endeavor. As an administrator, there is always a way to circumvent a solution’s from tampered protection. Really! By default, Windows administrators have unrestricted access to the system – and even though an application, hardened configuration, or group policy…

Tags:
, ,
PowerBroker for Windows can be configured to automatically identify the end user’s language preference

Implementing Least Privilege Around the World with PowerBroker for Windows

Posted July 17, 2014    Morey Haber

BeyondTrust recognizes that international, multilingual businesses have unique operating challenges, especially when it comes to implementing enterprise software. PowerBroker for Windows is a least-privilege solution often deployed across thousands of systems spanning multiple geographies and protecting users of diverse backgrounds. Earlier this year, PowerBroker for Windows introduces new data privacy features for EMEA and APAC,…

Tags:
, ,