TITLE

Why Outsource?

AUTHOR(S)
Foster, Steve
PUB. DATE
February 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents cases of workplace violence and data threat against two entities in the U.S. The first case involves a former employee who threatened his co-workers with e-mail messages. The other case involves a stolen laptop computer which contained names and social security numbers of students of the Metropolitan State College of Denver in Colorado. The prompt response of security authorities in both cases have helped curtail the problems.
ACCESSION #
24041030

 

Related Articles

  • Inaccuracy as a privacy-enhancing tool. Fuster, Gloria // Ethics & Information Technology;Mar2010, Vol. 12 Issue 1, p87 

    The accuracy principle is one of the key standards of informational privacy. It epitomises the obligation for those processing personal data to keep their records accurate and up-to-date, with the aim of protecting individuals from unfair decisions. Currently, however, different practices being...

  • House Near Vote on Data Breach Notification Bill - Enactment of National Standard will Impact Businesses Big and Small. Salazar, Luis // Venulex Legal Summaries;2006 Q3, p1 

    The article reports that the Financial Data Protection Act (H.R. 3997) will impact big and small businesses. The Act would levy a business-friendly, national standard for the protection of private consumer data and for the notification of consumers in the event of a data breach. H.R. 3997...

  • Are there really hidden dangers to data collection? Aitken, Stuart // Precision Marketing;4/6/2007, Vol. 19 Issue 8, p12 

    The author reflects on the hidden dangers of data collection in the future according to the report, Dilemmas of Privacy and Surveillance made by the Royal Academy of Engineering. According to the author, the report questions that security of the vast quantity of personal information on...

  • Tories demand data breach shake-up. Hummerston, Gemma // Precision Marketing;7/13/2007, Vol. 19 Issue 17, p1 

    The article focuses on the issue regarding the increased data breaches particularly in household name brands based on Information Commissioner's Office (ICO) annual report in Great Britain. According to Shadow Justice Secretary Nick Herbert, the adequacy of penalties for serious breaches of the...

  • One born every minute. Haggerty, John; Taylor, Mark // Computer Bulletin;Jan2005, Vol. 47 Issue 1, p26 

    The article shows how to elicit information that could enable attacks on computer systems and advises on how to stay on our guard. Most organizations are using countermeasures such as firewalls and intrusion detection systems to protect their critical data and software assets according to...

  • THWART THE THIEVES. Molving, Dianne // Credit Union Management;Feb2005, Vol. 28 Issue 2, p28 

    Provides information for protecting confidential data of bank and credit union members from identity thieves. Need to provide vendors with the necessary information only; Encryption of e-mailed member files; Implementation of security awareness programs.

  • MEPs tighten rules to protect personal data.  // Communications Law: Journal of Computer, Media & Telecommunicati;2014, Vol. 19 Issue 2, p38 

    The article reports that the European Parliament issued a data protection package to reform the 1995 Data Protection Directive. Topics discussed include the package composed of a General Regulation on managing the bulk of personal data processing in all sectors all over Europe, a Directive on...

  • Encryption from a Management Perspective. Leja, Christine // Information Executive;Dec2007, Vol. 10 Issue 7, p9 

    The article discusses encryption in the information technology industry in relation to a white paper titled, "A Management Perspective of Encryption Today" written by the Association of Information Technology (AITP) Research and Strategy Advisory Group (RASAG). It states that encryption...

  • Why your company needs a chief privacy officer. Garretson, Cara // Network World;5/28/2007, Vol. 24 Issue 21, p20 

    The article reports on the role of chief privacy officers (CPO) in a company in the U.S. CPO pay a crucial role in protecting identifiable personal information. According to Chris Zoladz, vice president of information protection and privacy with Marriott International, the CPO is more focused on...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics