Harboring Data: Information Security, Law, and the Corporation (Google eBook)
Stanford University Press, Oct 6, 2009 - Law - 368 pages
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short.
With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Information Vulnerability Landscape Compromising Positions Organizational and Hacker Responsibility for Exposed Digital Records
Reporting of Information Security Breaches A Reporters View Corporate Information Security and the Impact of Data Breach Notification Laws
Information Security and Patents embedding Thickets in Information Security? Cryptography Patenting and Strategic Implication Technology
Information Security and Trade Secrets Dangers from the Inside Employees as Threats to Trade Secrets
US Corporate Information Security Regulation and Its Shortcomings
Information Security of Health Data Electronic Health Information Security and Privacy
Information Security of Childrens Data From Ego to Social ComparisonCultural Transmission and Child Data Protection Policies and Laws in a Digit...
The Future of Corporate Information Security and Law
Information Security and Contracts Contracting Insecurity Software Licensing Terms That Undermine Information Security
Information Security Law and DataIntensive Business Models Data Control and Social Networking Irreconcilable Ideas?
Information Security of Financial Data QuasiSecrets The nature of Financial Information and Its Implications for Data Security
12 Principles Acxiom application attacks ChoicePoint claim Commerce in Software commercial companies compromised computer security confidentiality consent consumer context contract COPPA corporate information security covered entities credit card criminal cryptography customers cybersecurity data breach notification data security databases default disclosed electronic employees encryption enforcement example Facebook Fair Commerce Federal Trade Commission firewall fraud GLBA hackers health information HIPAA identity theft implementation incidents individual information security information technology infringement issues legislation license terms merchant Microsoft MySpace organizations patent patent pool percent personal data personal information phishing practices Principles for Fair prior art problem profiles records requires reverse engineering risk rootkit security breaches security research Security Rule security vulnerabilities security-related SNSs Social Security number Sony rootkit standard teens third parties threats tion trade secret update users Zetter