TITLE

EU to tighten data security rules

PUB. DATE
September 2015
SOURCE
Mortgage Finance Gazette;Sep2015, Vol. 146 Issue 1795, p14
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses that European Union council has planned to make the data security rules very strict and it also discusses that many government official data moves through mails so computer security and File Transfer Protocol(FTP) should be strong.
ACCESSION #
110352834

 

Related Articles

  • FTP: The Overlooked Achilles Heel. Johnson, Arne // Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p108 

    The article discusses the risk in transporting or storing electronic data via File Transfer Protocol (FTP). FTP is described like a car without seatbelts, offering nothing beyond the basic transportation of the data. It demonstrates that it could be taken for granted and become subject to...

  • How File Transfers Kill Productivity. MAGLIATO, CHARLIE // Law Practice: The Business of Practicing Law;Mar/Apr2012, Vol. 38 Issue 2, p32 

    The article focuses on the file transfer concerns in law firms, with reference to e-discovery. It is stated that law firms should be aware of government regulations related to particular information, along with opening up the firm to breaching confidential information and client trust. Topics...

  • Protocols Guide: TCP/IP Protocols: Application Layer Protocols: FTP: File Transfer Protocol.  // Network Protocols Handbook;2007, p14 

    Information on File Transfer Protocol (FTP), from a chapter of the book "Network Protocols Handbook," 4th edition, is presented. FTP, which uses file sharing between hosts, uses Transmission Control Protocol (TCP) to create a virtual connection for control information and then creates a separate...

  • ONC Unveils Guidelines for Direct Project.  // Journal of AHIMA;Jul2013, Vol. 84 Issue 7, p14 

    The article reports the release of the Office of the National Coordinator for Health Information Technology's (ONC) "Direct Implementation Guidelines for Assuring Security and Interoperability" for the Direct Project.

  • Portals: Gateways to Data. Alexander, Antoinette // Accounting Technology;Jan/Feb2008, Vol. 24 Issue 1, p20 

    The article discusses several implementations related to Internet portals for secure distribution of client data. WithumSmith+Brown uses Thomson's GoFileRoom as its document management system in its Client Portal. LarsonAllen is implementing a pilot of a GoFileRoom portal and increase the usage...

  • Why "Good Enough" File Transfer Is Not Nearly Enough To Suceed In 2014.  // Database & Network Journal;Apr2014, Vol. 44 Issue 2, p15 

    The articles discusses file transferring, risks in information technology (IT) and survey by software developer Ipswitch. Topics discussed include volume of file transfers, security and compliance risks and file transfers via email. File Transfer Protocol (FTP) servers, Managed File Transfer...

  • Design and Implementation of a Fast Algorithm for File Integrity Verification. Tingting Li; Ruili Jiao // Applied Mechanics & Materials;2014, Issue 631-632, p918 

    At present, MD5 algorithm is commonly used in the file transfer system to conduct the tests of file integrity, but when a file is too large, it will take a long time to generate MD5 code for the whole file, with the result of reducing the transmission efficiency of the file. Based on this...

  • Large File Transfer.  // International Journal of Micrographics & Optical Technology;2008, Vol. 26 Issue 1/2, p3 

    The article reports on the launching of the Proofpoint Secure File Transfer by the Proofpoint, Inc. in the U.S. The author stated that the Proofpoint Secure File Transfer enables end users to send large files quickly and easily, while minimizing the impact of large attachments on their...

  • Food for thought on security. Ng, Victor // NetworkWorld Asia;Mar/Apr2010, Vol. 6 Issue 1, p14 

    The article presents the ideas for managing security risks using few resources. It includes viewing security from a business perspective to protect and improve the business process, responding to every threat and buying point solutions, and complete the infrastructure security by using solutions...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics