Knight, William
November 2007
Computer Weekly;11/27/2007, p26
Trade Publication
The article reports on various data security challenges faced by pharmaceutical companies. The author examines the pitfalls and success stories of several pharmaceutical companies including the U.S. pharmaceutical firm Pfizer Inc. and Great Britain-based pharmaceutical group GlaxoSmithKline. According to an information technology security professional working in the perimeter team of a major pharmaceutical company, security is a challenging and ongoing process. Phil Huggins, chief technology officer at security consultancy Information Risk Management, says that a distinctive feature of pharmaceutical enterprises has been the importance of protecting intellectual property.


Related Articles

  • Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata. Mateo-Sanz, Josep M.; Domingo-Ferrer, Josep; Sebé, Francesc // Data Mining & Knowledge Discovery;Sep2005, Vol. 11 Issue 2, p181 

    Inference control for protecting the privacy of microdata (individual data) should try to optimize the tradeoff between data utility (low information loss) and protection against disclosure (low disclosure risk). Whereas risk measures are bounded between 0 and 1, information loss measures...

  • Infosecurity Europe 2006: Six new year resolutions for IT Security Managers.  // Database & Network Journal;Feb2006, Vol. 36 Issue 1, p10 

    The article presents suggestions which are helpful for information technology security managers' protection of cardholder's information. These include building and maintenance of a secure network, data protection, maintenance of a vulnerability management program, implementation of strong access...

  • CIOs fail to put a price on data loss. Saran, Cliff // Computer Weekly;10/14/2003, p32 

    Sixty seven per cent of information technology chiefs find it difficult to calculate the cost of losing data, according to a survey by market intelligence firm Taylor Nelson conducted on behalf of Unisys. The research also found that nearly 30% of respondents did not test their disaster recovery...

  • Managing security success. Coffee, Peter // eWeek;1/22/2007, Vol. 24 Issue 3, p26 

    The author discusses his views concerning the need for employees to be educated about data protection. According to the author, the role of every worker in considering information as an asset must be articulated clearly, monitored and assessed thoroughly and rewarded promptly when reliably...

  • Before the breach: Top steps to keep information confidential and IP secure. Passman, Pamela // InsideCounsel;Jun2015, Vol. 26 Issue 281, p40 

    The article discusses tips for helping general counsel and legal teams in mitigating risks of data breaches in corporations. Topics covered include the importance of assessing the corporate assets, how to determine key threats in accessing or exposing a corporate's data, and the importance of...

  • The Cyber-Workplace - Identifying Liability Issues in the Information Age and Managing E-Risk. Wilson, Nigel // Proceedings of the Conference on Digital Forensics, Security & L;2008, p73 

    The information age provides numerous opportunities for modern society but also presents significant challenges in identifying liability issues and in managing risk. Technological change has occurred rapidly and is continuing at the same time as other major trends and changes are taking place in...

  • THE REALITY OF ESPIONAGE. Joyce, Jim // Communications News;May2006, Vol. 43 Issue 5, p40 

    This article presents ways to protect confidential documents from the threats of economic espionage. Government regulations such as the Sarbanes-Oxley Act have spurred corporations to pay attention to their information-management systems, but compliance alone does not ensure security. Economic...

  • Don't cross the line. Alexander, David // ITNOW;Mar2008, Vol. 50 Issue 2, p08 

    The article focuses on the acceptable use policy (AUP) of information technology (IT) systems. It is said that AUP, which is also called a computer misuse policy, defines what can be done and what must not, regarding the use of IT systems. AUP also provides a legal defence for employees and...

  • Backing Into Disaster. Dickerson, Chad // InfoWorld;1/31/2005, Vol. 27 Issue 5, p20 

    This article discusses the importance of having backup and restore capabilities to information technology departments. All too often, information technology departments obsess over backup policies, but forget the most important part, the restoration of data. Every day, all over the world,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics