TITLE

Tips on Privacy Protection

AUTHOR(S)
Goldberg, James M.
PUB. DATE
November 2006
SOURCE
Financial & Insurance Meetings;Nov/Dec2006, Vol. 42 Issue 6, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents some guidelines to ensure privacy protection for meeting attendees. Meeting planners should coordinate with the company's database maintenance administrators to safeguard attendees' personal data such as telephone number, credit card numbers and addresses from unauthorized use of third parties.
ACCESSION #
23181648

 

Related Articles

  • A Research on Security and Privacy Issues for Patient related Data in Medical Organization System. Jin Wang; Zhongqi Zhang; Kaijie Xu; Yue Yin; Ping Guo // International Journal of Security & Its Applications;Jul2013, Vol. 7 Issue 4, p287 

    Recently, with the rapid development and implementation of wireless medical sensors, electronic healthcare (e-healthcare) has gained increasing popularity. Monitor and record some vital parameters of patients are of importance to know the patient's health condition. But malicious attacks happen...

  • Security at your fingertips.  // Computer Weekly;8/5/2008, p24 

    The article offers information related to technology-based security improvements. It is stated the improvements in technology-based security can enhance people's privacy, convenience and choice.

  • PLUGGING Information Leaks. Miller, Ron // EContent;Jan/Feb2007, Vol. 30 Issue 1, p26 

    The article relates how business organizations can successfully contain and secure confidential digital content. When it's so easy to transfer digital content, companies need a way of ensuring that only authorized parties can view critical content. Fortunately, there is a growing content...

  • THE IRONY OF PRIVACY CLASS ACTION LITIGATION. GOLDMAN, ERIC // Journal on Telecommunications & High Technology Law;Summer2012, Vol. 10 Issue 2, p309 

    An essay is presented regarding privacy class action litigation on online privacy protection in the U.S. It provides data on the identification of a quandary facing privacy advocates for the progress of normative objectives on data security of companies. Moreover, it suggests the use of...

  • The infinite power of personal health records.  // Medical Ethics Advisor;Aug2011, Vol. 27 Issue 8, p91 

    The article focuses on various issues concerning total access of personal health records (PHRs). It says that PHR is an electronic application by which people can access, manage, and share their health information in a secure, private, and confidential environment. It states that public concerns...

  • Online access to medical records: finding ways to minimise harms. Woodman,, Jenny; Sohal, Alex Hardip; Gilbert, Ruth; Feder, Gene // British Journal of General Practice;Jun2015, Vol. 65 Issue 635, p280 

    The authors reflect on online access to medical records policy in England which came into effect in April 2015, along with the ways to mimise harms in the practice. Topics discussed include the harms related to privacy and confidentiality, the concerns of clinicians regarding coercion or...

  • California Expands Data Breach Law.  // Information Management Journal;May/Jun2008, Vol. 42 Issue 3, p11 

    The article reports that California's data breach notification law has been expanded to cover medical and health insurance information. AB 1298 took effect in January 2008 and it requires that residents be personally informed when their electronically archived medical or health insurance data...

  • Privacy 3.0: Leave Me Alone Goes Away. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p58 

    The article discusses the definition of Privacy 3.0 which focuses on the proportionality between information processing and data sensitivity. According to Andrew Serwin, a partner with Foley and Lardner LLP, government and private citizens do not benefit from overbroad privacy restrictions. It...

  • Pondering privacy, a moving target. McClelland, Stephen // Intermedia (0309118X);Dec2010, Vol. 38 Issue 5, p8 

    The article focuses on the action taken by the European Commission to solve problems regarding privacy invasion in Europe. It states that the issues involving the widespread invasion of privacy, the abuse of personal information spread on social networking sites and the lax data governance in...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics