TITLE

Mucking Around In the Trash

AUTHOR(S)
Hunt, Steve
PUB. DATE
October 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p26
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The author discusses the concerns over the confidential information that ends up in the trash by various organization in the U.S. The author cites some instances in which sensitive information from the office buildings of doctors or lawyers is being thrown out in dumpsters. The author noticed that banks are the worst dumpsters as they thrown out most valuable data of their customers such as personal financial statements and bank accounts.
ACCESSION #
27148897

 

Related Articles

  • TECH TIPS.  // Managing People at Work;Sep2010, Issue 342, p2 

    The article offers important tips on how to prevent resigning employees from stealing the company's confidential information as well as tips on how to protect personal and business data on one's smart phone.

  • Securing sensitive company information.  // Administrative Professional Today;Oct2010, Vol. 36 Issue 10, p4 

    The article offers tips on how to privately secure the confidential information within the company which include identifying confidential information sources, holding of regular meetings, and the signing of confidentiality agreements among employees.

  • Analysis of the Univariate Microaggregation Disclosure Risk. Nin, Jordi; Torra, Vicen� // New Generation Computing;2009, Vol. 27 Issue 3, p197 

    Microaggregation is a protection method used by statistical agencies to limit the disclosure risk of confidential information. Formally, microaggregation assigns each original datum to a small cluster and then replaces the original data with the centroid of such cluster. As clusters contain at...

  • FDIC Sets Tough Standards on D&O Access to Confidential Info.  // Pratt's Letter;3/26/2012, p2 

    The article reports on the implementation of the Federal Deposit Insurance Corp.'s (FDIC) guidance regarding the copying and removal of confidential financial institution information in the U.S. It reveals that the new guidance aims to remind bank officers and directors that this activity is a...

  • HOW TO RUN YOUR BUSINESS IN A FISHBOWL. Feuer, Michael // Smart Business Cleveland;Nov2012, Vol. 24 Issue 4, p90 

    The article offers tips on how to protect some important assets of the company such as the company's information. It considers the present time as an era of heightened visibility where sensitive company information can be obtained by anyone and everyone. It asserts the importance of enforcing a...

  • Desperate times, deceitful measures.  // Accountancy;Jan2009, Vol. 142 Issue 1385, p43 

    This article reports on the use of corporate data by employees for their personal gain. The article discusses a practice in which employees use computer memory sticks to download competitive company information to use to their advantages in the event that they are fired. Information is presented...

  • ARTICLE 8: Disclosure. MacDonald, Carol A. // Journal of Property Management;Jul/Aug2013, Vol. 78 Issue 4, p62 

    The article focuses on Accredited Management Organization (AMO) Code of Professional Ethics. It says that the AMO Code of Professional Ethics addresses the role of an AMO firm plays in the disclosure of confidential or propriety information to a third-party without the consent of the client. It...

  • Electra knows the art of keeping documents invisible but available. Nylund, Liisa Nido // Caribbean Business;5/17/2007, Vol. 35 Issue 19, p38 

    The article reports on the wide range of integrated services offered by Electra Corp. that help healthcare providers keep confidential health information and business records in Puerto Rico. According to the firm's president Ramón Mellado, they have new products and services aimed toward...

  • WHY FOLLOW THE RULES? AN EMPIRICAL EXAMINATION OF EMPLOYEE RESPONSES TO CONFIDENTIAL INFORMATION RULES. HANNAH, DAVID R.; PANKRATZ, KIRSTEN M. // Academy of Management Annual Meeting Proceedings;2009, p1 

    This paper examines the use of rules to protect confidential information (CI). We conducted interviews with employees in two firms to develop a grounded theory of CI rule following. We theorize that employees' acceptance of CI rules is a key antecedent of rule following. Acceptance is in turn...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics