Vance, Jeff
January 2008
Network World;1/7/2008, Vol. 25 Issue 1, p36
Trade Publication
The article focuses on the issue of data leaks. According to the author, data leaks could be a big problem especially to the recipients of the blame. He cited TJX Cos. Inc. as an example of a company who was blamed for the data leak of which cost them millions. He adds that unprotected sensitive e-mail, losing a laptop, cell phone or USB drive can be a cause for serious data-leak problems. Furthermore, he said that internal blogs could also be the cause for data leaks especially if important information are being relayed.


Related Articles

  • Hunting for Leaks.  // Risk Management (00355593);Nov2006, Vol. 53 Issue 11, p8 

    The article focuses on the effort of companies to monitor and prevent leakage of confidential information. Stronger monitoring systems are being used by many businesses on their e-mail and phone networks to ensure that confidential information does not leak outside the company. Balancing the...

  • Untitled. Savvas, Antony // Computer Weekly;10/7/2008, p62 

    The article reports on the theft of the information stored on USB portable hard drives from the Service Personnel and Veterans Agency in Gloucester, England. It states that the British Ministry of Defense has admitted that three disk drives were taken from the high-security area of the military...

  • Health Club Confidentiality Leak. DeMars, Nan // OfficePro;Aug/Sep2005, Vol. 65 Issue 6, p28 

    Offers an advice for a health club employee who happened to hear a co-worker revealing confidential information about the company. Actions that need to be taken when a common gossip compromises the company; Role of employees in the protection of the company's confidential information;...

  • Untitled. Grant, Ian // Computer Weekly;1/22/2008, p5 

    The article presents the perpective of the European Data Protection Supervisor (EDPS) concerning the issue of legislation and protection of personal data. It is reported that the EDPS has condemned the inability of existing legislation to protect citizens against practices and proposals that...

  • Solving Gearhead's 'hot spots'  // Network World;1/10/2005, Vol. 22 Issue 1, p32 

    The article presents information on new technological products. The Ergonomic Mobile Computing Stand has the ability to reduce the risk of scrotal hyperthermia and keep the laptop from overheating. The Ergonomic Mobile Computing Stand is basically a piece of plastic that one can put his notebook...

  • Hardware helps protect sensitive corporate data. Messmer, Ellen // Network World;1/30/2006, Vol. 23 Issue 4, p22 

    This article describes computer network security and data protection hardware from PortAuthority. The PortAuthority 4.0 M100 and M500 appliances prevent confidential business information from being transmitted outside a corporate network via FTP, HTTP, or electronic mail. Capabilities include:...

  • Lost mobile devices threaten business.  // Accountancy;Oct2006, Vol. 138 Issue 1358, p69 

    This article discusses the security risks involved when mobile devices with sensitive information are lost or stolen. Between 40-50% of British travelers who lose such devices prefer to file claims with their insurance companies or would rather get a new model from their company than try to...

  • Center for Scientific Review; Notice of Closed Meetings. Spaeth, Jennifer S. // Federal Register (National Archives & Records Service, Office of;10/6/2011, Vol. 76 Issue 194, p62079 

    The article provides a notice of closed meetings in accordance with section 10(d) of the Federal Advisory Committee Act in the U.S. The grant applications and the discussions could disclose confidential trade secrets or commercial property including patentable material and personal information...

  • Can marketing leaks be plugged? Winters, Patricia; Freeman, Laurie // Advertising Age;12/10/1990, Vol. 61 Issue 51, p53 

    Discusses the problem on leaks of confidential marketing information in the United States. Value of confidentiality agreements with suppliers; Arrest of a video production company executive by the Federal Bureau of Investigation; Relevance of marketing information in industrial espionage cases.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics