TITLE

Information Security How to Protect Your Customer Data

AUTHOR(S)
Boike, Leonard
PUB. DATE
July 2005
SOURCE
Hospitality Upgrade;Summer2005, p168
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents ways for hoteliers to improve the privacy of guest or employee information in the hospitality industry. Determination of the type of data in software applications through assignment of security levels; Establishment of controls within the application itself; Importance of auditing your network and software.
ACCESSION #
17423641

 

Related Articles

  • Keeping Data Projects On an Even Keel. Kentouris, Chris // Securities Industry News;3/20/2006, Vol. 18 Issue 11, p14 

    Presents proceedings of discussions on data accuracy and protection within securities firms at a Financial Information Management conference in New York in March 2006. Challenges facing data managers regarding securities information; Statement from Capco President Predrag Dizdarevic about data...

  • Financial Service Sector Remains Proactive.  // Community Banker;Apr2009, Vol. 18 Issue 4, p15 

    The article claims that the financial sector ranks first among five U.S. industry sectors in terms of taking proactive measures to protect data. According to the Identity Theft Resource Center, in 2008 the financial services sector experienced 78 data breaches, compared to 240 for business, 131...

  • What price security? Reed, David // Precision Marketing;1/25/2008, Vol. 20 Issue 7, p25 

    The article focuses on the public data protection pricing in Great Britain. It cites that financial services providers have considered the idea of requiring their customers to pay the premium through making add-on services. However, it is noted that the public is aware that assuring data...

  • Payment processing firms look to protect against denial of service. Mohamed, Arif // Computer Weekly;5/31/2005, p24 

    The article focuses on issues relating to denial of service attacks on payment processing firms. Networks of up to 50,000 personal computers used in online extortion attempts. Payment processing firms are the next target for criminals who threaten distributed denial of service attacks on...

  • THE POLL.  // SC Magazine: For IT Security Professionals (UK Edition);Apr2007, p11 

    The article presents statistics on topics related to computer security and identity theft including the percentage of data breaches that occurred in the government sector in the second half of 2006 and the percentage of similar breaches that were recorded in the financial services sector during...

  • Giving Enterprise Security a Bigger Spotlight. Sraeel, Holly // Bank Technology News;Sep2005, Vol. 18 Issue 9, p8 

    Focuses on the launch of "Financial IT Security," a periodical whose mission is to provide insight, analysis and commentary about the security challenges before financial institutions and the technologies and services designed to thwart security breaches. Increasing incidence of identity and...

  • Everything you need to know about MSSPs. Pick, Kathryn // SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2013, p18 

    The article discusses the pros and cons of using managed security service providers (MSSP). The prospect of handing responsibility for organization's security to an outsider is a cause of concern. Companies are advised on things to consider before outsourcing security with MSSPs including...

  • Safety first.  // Accountancy;Mar1989, Vol. 103 Issue 1147, p144 

    This section presents a list of specialist organizations offering computer security services, including Datashiel.

  • Are you safe from HACKERS? Edlington, Sara // Caterer & Hotelkeeper;4/24/2003, Vol. 192 Issue 4269, p49 

    Reports on the need for data security of the hospitality industry. Sources of data threats; Greatest threat to a business's security according to a research; Tips on protecting data without alienating hospitality staff. INSETS: THE COST OF PROTECTION;TAKING PRECAUTIONS.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics