LegalTXTS – A Luminate Law Blog

Cybersecurity, Privacy & Internet Law

  • Home
  • About
  • Speaking
  • Contact

Recent Posts

  • Aloha, CCPA: What the New California Data Privacy Law Means For Hawaii Businesses
  • Cybersecurity For Small Businesses Tip #5 – Get Physical (Set Physical Controls)
  • Cybersecurity For Small Businesses Tip #4 – Stand Guard (Control Access)
  • Cybersecurity For Small Businesses Tip #3 – Sort It Out (Organize & Centralize)
  • Cybersecurity For Small Businesses Tip #2 – Keep Track (Take Inventory)

Categories

Tags

BYOD CDA CFAA Communications Decency Act Computer Fraud and Abuse Act concerted activity copyright copyright infringement cyber security cybersecurity cybersquatting data breach data collection data privacy data security defamation employee discipline employment employment law Facebook First Amendment FTC HR intellectual property Internet law invasion of privacy labor law misappropriation of information misappropriation of trade secrets National Labor Relations Act National Labor Relations Board NLRA NLRB privacy privacy law protected concerted activity SCA school law Section 230 social media social media firing social media policy Stored Communications Act trade secrets twitter

Archives

  • November 2019
  • October 2019
  • March 2019
  • May 2018
  • February 2018
  • September 2017
  • June 2017
  • April 2017
  • March 2017
  • January 2017
  • October 2016
  • September 2016
  • July 2016
  • May 2016
  • April 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • August 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • October 2014
  • August 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • March 2012
  • November 2011

Login Lessons From the Hawaii Missile Alert Fiasco

February 7, 2018 by Elijah Yip·0 Comments

Phones across Hawaii lit up at 8:07 a.m. on January 13, 2018 with an alert that a ballistic missile was hurtling toward the state.  Two minutes later, Governor David Ige learned that the alert was mistakenly sent.  But it took another excruciating 15 minutes before the governor took to Twitter to clarify that there was “NO missile threat to Hawaii.”  Why the delay?  Governor Ige later confessed that he forgot his Twitter password.

Companies can learn a lesson or two from the governor’s login woes.  Ready access to login credentials for your company’s online assets is crucial.  Being locked out of your website, social media accounts, cloud services, and other digital assets can seriously damage your company’s operations and reputation.  Securing usernames and passwords is just as important as keeping track of the keys to your office or company safe.

Here are some tips for keeping company login credentials safe and accessible:

1.  Designate a location for storing login credentials.

Employees authorized to set up or modify an online account on behalf of the company should be instructed to store the login credentials in a designated location.  This will prevent a frantic search for account information in mission-critical situations.  The designated location can be a file stored in a specific drive or folder.  If the file is encrypted – a highly recommended practice – make sure the encryption code is stored in a safe place.  In some situations, simply writing down login credentials on a piece of paper can work.  Just make sure the paper is stored in a safe and identified location.

2.  Ensure access to login credentials to those who need it.

Employees who need access to the company’s online accounts should be told where the login credentials for those accounts are stored.  Supervisors of employees who regularly use the account should know where the credentials are stored in case those employees separate from the company.

3.  Develop a protocol for modifying login credentials.

Company policy should clearly articulate procedures for modifying login credentials to company accounts.  For example, employees who make the modifications should be required to inform their supervisor in writing about the change and update the account information stored in the designated location.

4.  Set up accounts with company email addresses.

Employees should not be allowed to use personal email addresses to register online accounts on behalf the company.  Only company email addresses should be used to register accounts.  If the login name or password for the account needs to be reset, a reset confirmation email is typically sent to the email address under which the account is registered.  If the registered email address belongs to an employee, the company might not be able to complete the reset process if the employee (or ex-employee) refuses to cooperate.

5.  Specify ownership of online assets.

Company policy should clearly specify that any online accounts created for the company are owned by the company, not the employee who registered them.  Such a policy is especially necessary for social media accounts, which might seem like they belong to the employee promoting the company using the accounts.

Having login credentials at your fingertips is important to your company’s success, even if the stakes don’t involve warnings of impending disaster.

Related articles
  • Hawaii governor blames false missile alert delay on forgotten Twitter log-in
Ballistic missile David Ige Emergency management employment Hawaii HR HR law Login password social media ownership

About Elijah Yip

Elijah Yip is a co-founder/partner at Luminate Law, a Hawaii-based firm focused on serving small and medium-sized businesses. He practices cybersecurity law, privacy law, internet law, healthcare law, and commercial litigation. View all posts by Elijah Yip →

Post navigation

Previous Previous post: Vision-Impaired Customer of Grocery Chain Becomes First Plaintiff to Win ADA Website Accessibility Claim After Trial
Next Next post: The GDPR: A Tsunami of Data Regulation That Could Crash Onto Your Shore
Proudly powered by WordPress. Theme: Flat 1.7.11 by Themeisle.