Analytics
10/29/2013
06:54 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

New 'Whistleblower' Portal Lets User Report Incidents Anonymously

GRC Vendor LockPath offers whistleblower portal to let users anonymously report complaints, security violations

A new Web-based portal could offer employees and other users an anonymous method of reporting complaints or security violations in their enterprises without fear of reprisal.

LockPath, a maker of governance, risk, and compliance (GRC) technology, on Monday rolled out the Anonymous Incident Portal, a cloud-based service that lets users submit complaints, violations, or other concerns without giving away their identities.

The new portal was unveiled in conjunction with LockPath's release of Keylight 3.5, LockPath's new hybrid cloud GRC offering, which helps companies automate the security and compliance assessment of suppliers and business partners.

"The Anonymous Incident Portal is a way for employees to let someone know if they see something," says Chris Caldwell, CEO of LockPath. "It could be a physical security violation, or an IT security violation, a violation of a financial process, or any number of incidents. The key is that there is a secure and anonymous way to do it."

Some companies have anonymous "whistleblower hotlines," and the state of New York is considering a law that would help reward and protect whistleblowers, Caldwell observes.

While organizations may not be happy to have employees blow the whistle on potential violations, having them submit their complaints on a secure portal is better than having them dump information to WikiLeaks or give documents to the media, as Edward Snowden did to the NSA, LockPath states. The AIP also gives employees a way to flag incidents to their companies before reporting them to the Securities Exchange Commission (SEC) or other regulatory and law enforcement organizations.

"Employees often struggle with deciding when to report an incident and when to remain quiet given potential repercussions like harassment by the business, a career-limiting move, or termination," adds Caldwell. "AIP eliminates this fear by providing an anonymous and secure portal to express concerns, which can ultimately create an improved working environment for employees and ensure that a company's reputation is in its own hands, rather than in the hands of someone else."

LockPath's new Keylight 3.5 offering also includes Vendor Manager Hybrid, a new capability that allows third parties to submit audit-related questionnaires through a Web-based portal, bypassing the assessing organization's corporate network.

The new offering is designed to help companies ensure compliance among vendors and business partners, as well as internally, Caldwell says.

"LockPath has always helped customers manage relationships with third parties to ensure compliance," Caldwell states. "From law firms to financial institutions to health-care providers, organizations must regularly work with other vendors to complete due diligence in order to meet industry standards and regulations. This new offering lets organizations keep control of their sensitive data within the enterprise, while maintaining effective interactions with outside entities."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.