Women’s Empowerment and the Mask of Dictatorship in TogoLast year the government of Togo attempted to host a Pan-African Congress. This was done in an attempt to rebrand the government of Togo as…Mar 32Mar 32
Women’s Empowerment in Togo Requires an End to DictatorshipThe regime in Togo continues to try to present itself as a progressive government which is striving towards improving conditions in Togo…Feb 26Feb 26
Tips on Maintaining the Security Rule of HIPPAOne of the important provisions which is included in the Health Insurance Portability and Accountability Act (HIPPA) is the Security Rule…Feb 20Feb 20
Tips for Complying with the FTC Safeguard RuleThe purpose of the FTC’s Safeguard Rule is to ensure that entities which are covered by the rule maintain safeguards to protect customer…Feb 19Feb 19
Togo’s New Senate and the Sham of DemocracyTogo’s ruling party has recently won 34 out of 41 seats in the nation’s first Senate elections. This was an election which was boycotted by…Feb 19Feb 19
The Importance of Vendor SecurityBusinesses rely on vendors for essential services such as cloud computing, data storage, and software development. These arrangements are…Feb 18Feb 18
Laws and Cybersecurity Infrastructure in AmericaCybersecurity is a critical aspect of national security and economic stability in the United States. Given the increasing cyber threats…Feb 18Feb 18
The Critical Role of Cybersecurity Measures in Ensuring Compliance with the Gramm–Leach–Bliley ActThe Gramm–Leach–Bliley Act (GLBA) was passed in 1999. The law is somewhat controversial for the fact that it repealed part of the…Feb 15Feb 15
Cybersecurity and HIPPA ComplianceThe Health Insurance Portability and Accountability Act of 1996 (also known as HIPAA) was passed to protect protected health information…Feb 14Feb 14
Important Cybersecurity Measures for Enforcing COPPAThe Children’s Online Privacy Protection Act of 1998 (COPPA) was enacted for the purpose of protecting personal information of children who…Feb 13Feb 13
Lick Bottom African: A Response to David HindsDavid Hinds of the WPA has once again found himself at the center of controversy in Guyana. This time, the controversy stems from a recent…Feb 13Feb 13
The Importance of FERPA ComplianceThe Family Educational Rights and Privacy Act or FERPA was passed into law in 1974. The purpose of the law is to regulate access and…Feb 131Feb 131
How PCI DSS Secures Credit Card DataThe Payment Card Industry Data Security Standard (PCI DSS) is a standard which exists to protect credit card data. This is a regulation…Feb 12Feb 12
Understanding the GDPRThe General Data Protection Regulation (GDPR) is a European Union law which was designed to protect the privacy and security of personal…Feb 12Feb 12
What is the Video Privacy Protection Act and How Does it Protect PII?The Video Privacy Protection Act (VPPA) was passed in 1988 for the purpose of protecting the video rental history of consumers. The act was…Feb 11Feb 11
Togo’s Development Requires an End to DictatorshipIn recent years the regime in Togo has been trying to depict itself as one which is committed to national and regional development. This…Feb 11Feb 11
Understanding Pretexting and AuthoritySocial engineering is a deceptive practice that manipulates individuals into divulging confidential information or performing certain…Feb 7Feb 7
The True Legacy of Gnassingbé EyadémaA colloquium was recently organized in Togo for the purpose of honoring Gnassingbé Eyadéma. Eyadéma was responsible for the assassination…Feb 4Feb 4