P2P Networks Rife with Sensitive Health Care Data, Researcher Warns Page 1 Sur 3

Total Page:16

File Type:pdf, Size:1020Kb

P2P Networks Rife with Sensitive Health Care Data, Researcher Warns Page 1 Sur 3 P2P networks rife with sensitive health care data, researcher warns Page 1 sur 3 Home News Blogs White Papers Newsletters IT Careers News Blogs P2P networks rife with sensitive health care data, researcher Shark Bait Knowledge Centers warns Operating Systems Networking & Internet Data leaks could be significant threat to patients, providers, Mobile & Wireless Dartmouth study finds Security Cybercrime & Hacking By Jaikumar Vijayan Comments 6 Recommended 32 Share Spam, Malware & Vulnerabilities Security Hardware & Software Standards & Legal Issues January 30, 2009 (Computerworld) Eric Johnson didn't have to break into a computer to Privacy Intellectual Property & DRM gain access to a 1,718-page document containing Social Security numbers, dates of birth, Disaster Recovery insurance information, treatment codes and other health care data belonging to about Storage 9,000 patients at a medical testing laboratory. Business Intelligence Nor did he need to ransack a health care facility to lay his hands on more than 350MB of Servers & Data Center sensitive patient data for a group of anesthesiologists or to get a spreadsheet with 82 fields Hardware of information on more than 20,000 patients belonging to a health system. Software Development In all instances, Johnson was able to find and freely download the sensitive data from a Careers peer-to-peer file-sharing network using some basic search terms. Management Johnson, a professor of operations management at the Dartmouth College Tuck School of Government Business, did the searches last year as part of a study looking at the inadvertent Opinion hemorrhaging of sensitive health care data on Comments Columnists Related Internet file-sharing networks. RESOURCE ALERTS SharkTank to receive Security Resource Alerts Webcasts Active Comments The results of that study, which are scheduled to Video be published in the next few days, show that data Podcasts Dave C says: The ITSec people leaks over P2P networks involving the health care White Papers at these orgs should be doing sector pose a significant threat to patients, the following: 1. Awareness Webcasts Computerworld Reports providers and payers, Johnson said. Zones training - ensure staff who handle sensitive... "When you start thinking about the nature of these Dynamic Data Center and Virtualization Drives Operational Case Study Library Read the rest | Reply disclosures, it's far more worrisome" than Excellence at Emory Healthcare RSS Feeds compromises such as those involving payment Events David says: Unfortunately, we How to Future-proof for Mobility: An Integrated Management and card data, he said. Face to Face are beginning to see the down Security Strategy side of consumer computing. I Virtual "Here you are leaking not just detailed personally Preparing for PCI 1.2 Web Seminar won't say the majority, but I identifiable information but also very personal Industry would... medical information related to patients," Johnson Print Subscriptions Read the rest | Reply said. Such data can be readily used by hospital Whitepapers All Comments (6) | Post New employees, the uninsured, organized crime rings, Ritz Camera Centers Snap "Common Sense" Image for PCI illegal aliens and drug abusers for medical identity Compliance theft, and to fraudulently obtain costly medical Zone services and prescription drugs, he said. And while Performance Monitor: ERP at the Speed of Light such fraud can cost millions, there is less Product Guide: Oracle ONE - Product Review The Security monitoring for such fraud in the health care Zone industry than there is in the financial sector. With the mobility Computerworld Reports of employees and P2P networks allow Internet users to share music, the ease with which external devices video and data files with others on the network. can be brought in and out of a network, Trend Micro Gets Smart with a Hybrid Approach Normally, popular P2P clients -- such as Kazaa, continuing to build your security plan Computerworld Technology Briefing: Intelligent Users Use for network servers and clients is a LimeWire, BearShare, Morpheus and FastTrack -- must. Fortunately, there is much that let users download files and share items from a Business Intelligence organizations can do to protect particular folder. But if proper care isn't taken to Trend Micro Gets Smart with a Hybrid Approach themselves from attacks - internal and control the access that these clients have on a external. Having the right policies, procedures and server configurations is system, it is easy to expose far more data than critical... intended. Editor's Picks Learn more in The Security Zone For example, Dartmouth conducted a similar study about 18 months ago and found volumes of EU's charges against Microsoft over IE 'just silly,' says expert See All Zones sensitive financial data on P2P networks as a As window closes on Vista, Microsoft makes last-ditch corporate result of inadvertent data leakage. At a push congressional hearing in July 2007, security experts testified that millions of documents, including sensitive military and government Security expert says Microsoft should cut IE's links to Windows documents, were being leaked on P2P networks. Even pharmaceutical giant Pfizer Inc. became a victim when an employee illegally installed a P2P client on a company computer Eyeing Intel, Nvidia's Ion wins three votes of confidence and exposed personal data belonging to 17,000 employees. Report: Free Windows 7 upgrades to run until January 2010 1 2 Next » Solid-state disks offer 'fast erase' features http://www.computerworld.com/action/article.do?command=viewArticleBasic&articl... 12/02/2009 P2P networks rife with sensitive health care data, researcher warns Page 2 sur 3 Make a Comment Recommend Story Slashdot this Digg this Print Story Send Feedback Email this Reprints Sign up for the Computerworld Daily newsletter. Email: Related Content Webcast: Preparing for PCI 1.2 Web Seminar Whitepaper: Product Guide: Oracle ONE - Product Review CW Report: Trend Micro Gets Smart with a Hybrid Approach Intel taps P2P technology for cancer research Users look to harness PCs for big processing jobs Web Developer MeshNetworks partners for mobility Arlington, VA Grid-computing software hitchhikes on Kazaa Infrastructure Developers needed for ... RIAA gets a chance to overturn video streaming order in music piracy case NYC Systems Engineer Fort Myers, FL 21st Century Oncology Today's Top Stories Lead Developer EU's charges against Microsoft over IE 'just silly,' says expert New York, NY As window closes on Vista, Microsoft makes last-ditch corporate push More Jobs | Post A Job Security expert says Microsoft should cut IE's links to Windows Eyeing Intel, Nvidia's Ion wins three votes of confidence Report: Free Windows 7 upgrades to run until January 2010 Solid-state disks offer 'fast erase' features Fired up about IT? Join Sharkbait and share your true tales of IT. SharkBait is the place What People Are Saying See comments | Add new for you to sound off about everything IT – the VMworld Europe | Cannes | 24-26 good, the bad, and the rest of the weird stuff Feb - REGISTER NOW you deal with every day. Join Europe's Largest Virtualisation All I can say is lawsuit... Rate this Community. Discover New Products, Best Practices and More. Submitted by Anonymous on January 30, 2009 - 16:56. New baits Why a CMDB? I can't stand lawsuits in general but this is exactly when one should IT best practices (ITIL) have shown The more that changes... the benefits of a CMDB. Click for be used to force compliance. FBI should be involved in tracing the My favorite users whitepapers. IPs to physical locations and heads should roll. Rated +2 6 Votes phishing for users Understand Enterprise IP Telephony - Free eBook reply | report this comment Free eBook: 11 Chapters on IP Telephony. 96 page Enterprise Deployment Guide. Need Help Deploying or Oops what was I thinking.. Rate this Supporting CA SiteMinder? Professional, Affordable Enterprise Submitted by Anonymous on January 30, 2009 - 16:59. Security Expertise from an Award- Winning Team. I almost forgot, unless there is movies or mp3 being shared from Buy Windows Server Backup the same IP authorites won't get involved. Stupid me.... Software & Get 2nd Free Rated +2 Security and Trust: The Backbone of Doing Business over the Backup without the Backup Window. reply | report this comment 6 Votes Recover Instantly from Any Failure. Internet Try it FREE for 30 days! Earning the trust of online customers is vital for the success of any company that requires sensitive data Consumer Computing Rate this to be transferred over the internet. With VeriSign you See your link here can put technology in place to help your online Submitted by David on January 30, 2009 - 17:52. business protect customer data and build consumer Unfortunately, we are beginning to see the trust. Learn how with this white paper. Download this white paper now! Subscribe to our e-mail down side of consumer computing. I won't say the newsletters majority, but I would guess a large portion of Rated +3 3 Votes For more info on a specific the population sees the off-the-shelf PC at any newsletter, click the title. Details will be displayed in a new window. retailer as not being much different than a TV, just plug it in and it's ready to go. Then comes Finance the easy to load software, perhaps downloaded for IT Blogwatch: ...Read the entire comment Security Kindle 2 to fan flames for e-books? We're reading up on Amazon's "new, improved" e-book Computerworld Daily News (First reply | report this comment Look and Wrap-Up) reader. ... [more] Computerworld Blogs Newsletter The Weekly Top 10 See comments | Add new White Papers More E-Mail Newsletters Read up on the latest ideas and technologies from companies that sell hardware, software and Enter E-mail Address services. A Better Way to Manage Data in Virtualized Environments with CommVault® Simpana® Universal Virtual Server Agent Subscribe to Computerworld Business Continuity - Are you Always Open for Business? 40 years of the most Product Guide: Oracle ONE - Product Review authoritative source of news and View more whitepapers information for IT leaders.
Recommended publications
  • Take This GUI and Shove It
    Sign in or Register Applications Cloud Computing Data Explosion Developer World Mobilize Security Central Virtualization News Blogs Test Center Technologies Tech Watch White Papers Webcasts Deep Dives Video More InfoWorld Home / Networking / The Deep End / Take this GUI and shove it Today's Headlines: First Look Newsletter Find out what will be news for the day, with our first-thing-in-the-morning briefing. OCTOBER 04, 2010 Take this GUI and shove it Share In many cases, a command-line interface makes life easier than some fancy GUI. Here's why Print | 6 comments Like 18 people like this. Be the first of your friends Share Take this GUI and shove it iPad redux: Apple listens to users! ‹ previous page 1 2 3 next page › Dear VMware: Please don't buy Novell Terminal servers -- saving your bacon, one console at a Let me offer an example. I recently had a relatively complex meshed VPN network to construct time using Cisco ASA security appliances. Using the CLI, I configured one ASA5520 with everything I needed: IP addresses, routes, a tunneled OSPF configuration, VPN tunnel definitions, a bevy of Share QoS rules, access-lists, remote and local administration rules, SNMP strings, logging, a new List of all recent posts firmware version, the whole works. I was then able to copy off that text-based configuration and run it through sed to do a search and Share replace on IP addresses and network definitions, and within a minute or two I had a complete configuration for the other ASA5520s. All I had to do to get them running was log into them, copy over the right firmware and their configuration file, and reboot them.
    [Show full text]
  • Doctors Interested in Apple's Ipad
    Home News Blogs In Depth Reviews White Papers Newsletters IT Jobs News Blogs Doctors interested in Apple's iPad; 1 in 5 plan to Shark Bait Knowledge Centers buy one Operating Systems Networking & Internet And almost 40% of survey respondents want Mobile & Wireless Security more info on new device Storage By Lucas Mearian Business Intelligence February 10, 2010 04:48 PM ET Servers & Data Center Comments (9) Recommended (7) Hardware Digg Twitter Share/Email Processors Windows & Linux PCs Computerworld - According to one medical software vendor, physicians Macintoshes are already warming up to Apple's coming tablet, the iPad, with 22% Laptops percent of clinicians in a survey saying they plan to purchase the Servers device within a year. Cloud Computing Mainframes & San Mateo, Calif.-based Epocrates Inc. surveyed 350 clinicians a few Supercomputers days after Apple announced the iPad. The company claims more than Software 275,000 physicians subscribe to its free or paid software, which Development provides access to clinical information from smartphones like the Careers iPhone, Blackberries and Palm devices. Management Government The medical software provider also announced that its clinical reference Opinion application for the iPhone and iPod touch devices will be customized White Papers & Webcasts Columnists for the new iPad. SharkTank Avoiding Costs From Oversizing Data Center and Network More "By optimizing our software for the Webcasts Room Infrastructure iPad, we are capitalizing on the larger Video Health care and IT Download Now screen real estate and interactivity Podcasts As health data goes digital, security risks grow provided by this sophisticated device," Meet the experts: Take the next step to maximize your White Papers Rose Crane, CEO of Epocrates said in virtualization management ROI Computerworld Reports N.Y.
    [Show full text]
  • Greenit Infoworld
    Datacenter cooling makeovers can deliver quick, refreshing savings | Green IT - InfoWorld Page 1 of 6 App Dev Applications Big Data Cloud Computing Consumerization Data Center Mobile Tech News Blogs Test Center Technologies Tech Watch White Papers Webcasts Deep InfoWorld Home / / Datacenter cooling makeovers can deliver quick,... Today's Head Find out what wi -thing-in-the-mor OCTOBER 14, 2009 Datacenter cooling makeovers can deliver quick, refreshing savings Thermal mapping and real-time sensors can swiftly pinpoint opportunities for real energy savings By Ted Samson | InfoWorld Follow @tsamson_IW Print | Add a comment Like 1 Data-processing and storage demands have soared over the years as organizations and customers have demanded quicker access to a larger array of information and resources, from accessing sales reports from past fiscal years to conducting real-time teleconferences to viewing and sharing high- def videos of Aunt Linda's new baby hiccupping for three minutes straight. Plenty of datacenter operators have embraced perhaps the simplest solution possible: throwing hardware at the problem. Only later do problems with this approach begin to surface. For example, datacenter operators have failed to accommodate for the effect that, say, doubling the IT load will have on cooling and airflow. In a vain effort to keep all the machines operating at a safe temperature, datacenter operators have turned to cranking up CRAC units to the max -- or to put it another way, blowing cold air at the problem. This has proven costly as many datacenters operator find themselves paying as much to cool IT hardware as they pay to power it.
    [Show full text]
  • Computerworld Magazine Help Desk Newsletters Jobs at IDG Privacy Policy Reprints Site Map Ad Choices
    Subscribe to a Newsletter Solution Centers Events Magazine RSS Topics News In Depth Reviews Blogs Opinion Shark Tank IT Jobs White Papers Webcasts More 100 BEST PLACES TO WORK IN IT 2011 Overall Rankings for 2011 Find the top employer that best suits your needs. Sort the Best Sort by key criteria View the full 2011 package Places to Work by key criteria, such as training days, and add -- Choose an option -- View and sort the top 100 filters by region and/or organization size. Note that the more ranking filters you add, the fewer organizations will be listed. Filter by region In the No. 1 spot: USAA -- Choose a region -- Employer scorecard: The tops for training, benefits Filter by company size 29,000 IT workers have their -- Choose a size -- say Tell us about the worst place to work! OVERALL RANK BEST PLACE TO WORK 1 USAA 2 Securian Financial Group Inc. 3 General Mills Inc. 4 Genentech Inc. 5 Verizon Wireless 6 University of Pennsylvania 7 Chesapeake Energy Corp. 8 Salesforce.com Inc. 9 Booz Allen Hamilton Inc. 10 Quicken Loans Inc. 11 American Fidelity Assurance Co. 12 Bank of America Corp. 13 Sempra Energy 14 SAS Institute Inc. 15 National Information Solutions Cooperative 16 Kaiser Permanente 17 Prudential Financial Inc. 18 Southern Co. 19 Texas Health Resources Inc. 20 Lehigh Valley Health Network 21 OhioHealth 22 Palmetto Health 23 Medtronic Inc. 24 Cedars-Sinai Medical Center 25 CME Group Inc. 1 - 25 | 26 - 50 | 51 - 75 | 76 - 100 Sponsored Links Resource Center Capgemini - We are the ones who help you face these Are you maximizing IT efficiency? Learn how to boost Industry Leading SIEM daily dilemmas.
    [Show full text]
  • Is the Cloud Safe for Archiving?
    Is the Cloud Safe for Archiving? http://www.networkworld.com/podcasts/panorama/2010/041910pan-clou... Is the Cloud Safe for Archiving? By Network World Staff, Network World, 04/19/2010 Share/Email Tweet This Podcast Comments Questions about podcasting Previous Episode About Network World Panorama All podcasts Interviews with industry experts and analysts that give you a high-level view of the networking landscape. Subscribe With digital data continuing to grow and limited growth in IT budgets, many CIOs are looking towards the cloud for their digital data archiving. But is the cloud safe for the storage of digital data? Steve Chan of ZL Technologies talks with Keith Shaw about the pros and cons of moving archiving to the cloud, and what enterprises should expect. (16:10) Show notes Other related reading material: ZL Unified Archive solution overview (PDF) ZL cloud deployment schemes (PDF) Archive Title Time Lesser-known Web app hacks 18:47 Preventing Video from Crashing Your Network 12:41 Q&A: Vint Cerf on future of IP, cloud and Interplanetary Internet 15:19 Newsletter Sign-Up Lessons Learned from Virtualization 16:03 Receive the latest news, reviews and trends on your favorite Hail to the Chief: Debut Episode 22:21 technology topics RSA 2011 Preview: Security Trends to Watch 16:15 Data Center Alert New Realities of Employee Data Theft 23:37 Cloud Computing Alert Steps to Cut Your Data Center Electric Bill 18:51 Virtualization Alert Last-minute Website tips for Cyber Monday 12:40 Daily News Alert How Safe are Our Apps? 20:17 View all
    [Show full text]
  • Barack Obama's Big Data Won the US Election - Computerworld
    3/11/13 Barack Obama's Big Data won the US election - Computerworld Blogs White Papers Webcasts Newsletter RSS Financial IT Government IT Healthcare IT Government IT: How federal, state and local governments use technology Home > Government IT Blog Spotlight Opinion Barack Obama's Big Data won the US Sharky election Testing, testing By Mike Lynch This pilot fish is supervising the people November 13, 2012 04:44 PM ET 4 Comments who use public PCs at a large urban library, and though they're pretty well locked down, some library patrons get more than a little upset when they Like 37 can't "test" the equipment. SHARKY IDG News Service - Traditional news media on the eve of the United States Your tax dollars at work Presidential election was reporting a closely-contested election and there AARON DAVIS The futuristic marriage of machine translation and were many polls indicating that it might be a photo-finish. However, one speech recognition thing has become clear from this election: not all polls are created equal. The pollsters using the latest data processing and analysis techniques were the most successful in predicting the outcome of the elections. For those who had the stamina to watch the election campaign unfold over 22 long FREE INSIDER GUIDE months, it became not just a battle of ideologies and campaign issues, but also a rivalry between old media pundits and new media analysts. IT Certification Study Tips Register for this Computerworld Insider Study Tip Three different "polling aggregators" used different methodologies to guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and predict the outcome of the elections.
    [Show full text]
  • Infoworld's Top 10 Emerging Enterprise Technologies P3of7
    InfoWorld's top 10 emerging enterprise technologies | Cloud c... https://www.infoworld.com/t/cloud-computing/infoworlds-top-1... Application Development Sign in News Blog White Papers Webcasts Test Center Technologies Tech Watch Video Deep Dives More InfoWorld Home / Cloud computing / InfoWorld's top 10 emerging enterprise... NOVEMBER 21, 2011 InfoWorld's top 10 emerging enterprise technologies Which of today's newest shipping technologies will triumph over the long haul? Here are our best guesses By InfoWorld staff | InfoWorld Follow @infoworld Print | ‹ previous page 1 2 3 4 5 6 7 next page › 8. Continuous build tools There are two ways for programmers to look at new tools like Jenkins , Hudson , and other "continuous integration" servers , which put all code through a continuous stream of endless tests: The lone cowboy coders shriek with horror at the way that they're shackled to a machine that rides herd over them. The more collaboratively minded among us like the way continuous build tools help us work together for the betterment of the whole. When a continuous integration server sends you a scolding email about the problems with the code you checked in 10 seconds ago, it doesn't want to ruin your feeling of accomplishment. It's just trying to keep us all moving toward the same goal. Tools like Hudson or Jenkins aren't new because there have been a number of slick proprietary continuous integration tools for some time. Rational Team Concert, Team City, and Team Foundation Server are just a few of the proprietary tools that are pushing the idea of a team.
    [Show full text]
  • Explaining Salesforce.Com to the CEO: Top 5
    6/21/2009 Explaining Salesforce.com to the CEO:… CIO Home | White Papers | Bloggers | Webcasts | Newsletters | More IT DrillDown » Data Center EXPERT VIEW Explaining Salesforce.com to the CEO: Top 5 Business Recent Articles Payoffs Explaining Salesforce.com to the CEO: Top 5 When you're ready to choose a new CRM system and need to explain "why Salesforce.com" to Misconceptions the CEO, you need to explain business payoffs, not jargon or the latest sales rep messages. By David Taber Leave a comment (6) TUE, APRIL 21, 2009 — CIO — Last week, we discussed the top 5 CONNECTIONS misconceptions regarding Salesforce.com, keeping in mind that most of the lessons learned apply to any modern SaaS SFA or CRM system. This Salesforce.com week, let's talk about how to explain the business payoffs in terms that business executives want. Like any CRM vendor, Salesforce.com has its share of sales messages that may make for good press, but aren't all that relevant to a CEO. Cloud computing. APIs and infrastructure? Though you need to understand those issues as an IT pro, leave that discussion at the door when you go to see the CEO. Business Payoff #1: Increased sales productivity, improved profitability A properly implemented SaaS CRM system can mean measurable improvements in deal win rates, number of deals completed per sales rep, and higher average sale prices (ASPs). Salesforce.com and other vendors go out of their way to publicize good numbers for each of these metrics. Simplifying IT and Green Initiatives are Driving Virtualization Data Center MarketSpace SPONSORED BY CIO AND IBM While there's nothing wrong with these improvements, productivity per se isn't the important part.
    [Show full text]
  • 1 in the United States District Court for the Eastern
    IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF PENNSYLVANIA STREAMLINE BUSINESS SERVICES, CIVIL ACTION LLC v. NO. 14-1433 VIDIBLE, INC., et al. Baylson, J. August 26, 2014 MEMORANDUM RE MOTIONS TO DISMISS Plaintiff, Streamline Business Group, brings claims against a former business partner, Vidible, Inc., two of Vidible’s principals (collectively, the “Vidible Defendants”), and two venture capital firms that invested in Vidible, alleging breach of contract, unjust enrichment, and tortious interference. All Defendants have moved to dismiss for lack of personal jurisdiction. The Vidible Defendants have also moved to dismiss for failure to state a claim and improper venue. Since personal jurisdiction is a threshold issue, this Memorandum will first address that question. I. FACTUAL BACKGROUND & PROCEDURAL HISTORY Vidible, Inc. is a Delaware corporation with its principal place of business in Washington, which created an exchange market place for distributors and publishers to buy and sell videos for online advertising. Streamline Business Group (Plaintiff) is a Pennsylvania company that entered into an oral contract with Vidible in 2012 to procure customers for Vidible. Michael Hyman (Hyman), a Washington resident, and Timothy Mahlman (Mahlman), a California resident (together the “Individual Defendants”), are principals of Vidible who engaged in all of the communications Plaintiff alleges. Greycroft Partners LP (Greycroft) is a Delaware venture capital firm with its principal place of business in New York. Defendant IDG Ventures USA (IDG) is a Delaware venture capital firm with its principal place of business in California (collectively the “Investors”). 1 A. Plaintiff’s Allegations Plaintiff alleges the following facts. In 2012, Plaintiff and Vidible entered into an oral agreement1 to share the fees from the customers Plaintiff recruited for Vidible’s business for a five-year term.
    [Show full text]
  • Too Many Cooks Spoil the CR
    Too Many Cooks Spoil the CRM System - CIO.com - Business Technolog... http://www.cio.com/article/502763/Too_Many_Cooks_Spoil_the_CRM_... CIO Home | White Papers | Bloggers | Webcasts | Newsletters | RSS | More IT DrillDown EXPERT VIEW Too Many Cooks Spoil the CRM System Unlike most enterprise applications, CRM systems have users who want to be administrators. Danger lies ahead! Here's advice on how and why to just say no to admin rights. By David Taber Comments MON, SEPTEMBER 21, 2009 — CIO — CRM systems have varying degrees CONNECTIONS of security and privilege management, but all the serious CRM options, SalesLogistix whether on premises or in the cloud, have fine-grained security because the Salesforce.com data is meaningful and must be carefully controlled. CRM users, particularly in sales, will quickly discover that they can't change things to make them look the way they want to (read: game the system) with their normal user level of data access. So they will invest a plausible reason why they need system admin privileges, and all too often they'll be granted full superuser status in the CRM system. And this would be a good idea why? What trouble lies ahead? Let's start with the fact that users haven't been trained in the intricacies of the CRM system (and with systems like Salesforce.com, Microsoft Dynamics, or Seibel the ante can amount to a full week's worth of classes). They have no idea what kind of damage they can do with seemingly insignificant changes. They don't understand the security model, or the object model, or the external integrations, or the workflows.
    [Show full text]
  • Download First Chapter
    1 CATALYST FOR THE FUTURE ecades before the Internet- fueled explosion of youthful tech bil- Dlionaires, Patrick J. McGovern Jr. built an empire and a legacy that generated far more than an annual spot on the Forbes list of richest people. McGovern built IDG into a worldwide technology media juggernaut that foretold and fueled the global information technology revolution. At its peak, IDG Communications had pub- lications in nearly 100 countries, started an average of one new publication somewhere in the world every two months, and grew into a $3.8 billion behemoth with more than 13,000 employees around the globe. It owned influential global brands such as Computerworld, PCWorld, Macworld, InfoWorld, CIO, GamePro, and Network World, spawned 460 websites, 200 mobile sites and apps, and nearly 300 print titles in business technology, consumer technol- ogy, digital entertainment, and video games. IDG gave the world the bestselling For Dummies book series, and IDC, the company’s highly respected research arm, had more than 1,000 analysts who followed technology trends in more than 110 countries. IDG’s con- ference and exhibition management team produced more than 700 1 FUTURE FORWARD events and conferences annually in 55 countries, and San Fran- cisco–based IDG Ventures USA (now called Ridge Ventures),grew into a leading early-stage venture capital firm, the first of many IDG VC firms around the world. Today, those firms have a total of $3.6 billion under management.1 From an early age, this grandson of Irish immigrants had that rare combination of desire, self- confidence, and vision that marks those who emerge as the most influential of leaders.
    [Show full text]
  • February 3, 2014
    February 3, 2014 Elizabeth M. Murphy Secretary Securities and Exchange Commission 100 F Street, NE Washington, DC 20549-1090 Submitted via email: [email protected] Re: Comments on Proposed Rule: JOBS Title III - Crowdfunding: #141-146 “The great aim of education is not knowledge but action” - Herbert Spencer. Dear Ms. Murphy: Thank you for the opportunity to provide comments to the Securities and Exchange Commission (the “Commission”) on its proposed amendments. The Advisory Council was formed to address a very important need for investor education pursuant to the Jobs Act. Education is critical both for accredited and non-accredited investors for their long term success, as well as that of the Jobs Act. The advisory council consists of a group of prominent practitioners, educators and industry experts with representatives from CFPA, CFIRA & NLCFA. The SEC has recognized this need and issued basic guidelines for equity investor education; section 4A(a)(3) of the Jobs Act states that intermediaries will be required to “provide… disclosures related to risks and other investor education materials.” However, scope and specific requirements for other materials are left vague. This is where we see a great opportunity, and would like to present the following objectives to this advisory council: 1. Act as advisory board to develop standards for a complete, systematic online investor education program that prepares investors to participate in the crowdfunding marketplace while mitigating potential risk of fraud 2. Create a BOK (body of knowledge) to meet and elaborate upon FINRA and SEC recommendations/requirements for investor education 3. Submit BOK to SEC to meet 90-day comment deadline.
    [Show full text]