TITLE

You Can Ensure Privacy and Security

AUTHOR(S)
Carroll, Kathleen
PUB. DATE
March 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p72
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses ways to ensure information privacy and security. It highlights the need to conduct a privacy impact assessment early on the process to assure the achievement of privacy and security, leading to the early detection of the potential privacy risks. It also introduces a risk management tool, the PIA, that will examine the system to ferret out any possible privacy risk. In addition, it cites several key questions to ask during a PIA.
ACCESSION #
37018486

 

Related Articles

  • Risk-based Valuation of Investments in Information Security - A Combination Approach. Prakash, Puneet // Journal of Information System Security;2012, Vol. 8 Issue 1, p43 

    Information systems security is among the top concerns of both the public and private sectors. However, the valuation of investments in information security has proven difficult. This paper argues that the price that the market charges a firm to bear the risk associated with its information...

  • Understand your security risks. Kuppinger, Martin // Computer Weekly;7/30/2013, p15 

    The author argues the need for organizations to conduct security risk assessments to protect their corporate information. Topics covered include information at risk which may contain intellectual property that forms the foundation of the competitive advantage a company has, understanding...

  • A GENERAL, BUT READILY ADAPTABLE MODEL OF INFORMATION SYSTEM RISK. Alter, Steven; Sherer, Susan A. // Communications of the Association for Information Systems;2004, Vol. 14, p1 

    This article is the first of two whose goal is to advance the discussion of IS risk by addressing limitations of the current IS risk literature. These limitations include: • inconsistent or unclear definitions of risk, • limited applicability of risk models, • frequent omission...

  • Back IT up. Allen, David // Chartered Accountants Journal;Nov2004, Vol. 83 Issue 10, p13 

    Discusses approaches for the reduction of business risk through maintenance of information security. Establishment of a disaster recovery plan; Considerations for computer technology; Pros and cons of automated offsite backup technology.

  • Territorial Intelligence as a Knowledge Creation Process: The Tunisian National Food Safety System Experience. Chouk, Souad Kamoun // IUP Journal of Knowledge Management;Jul2012, Vol. 10 Issue 3, p53 

    The study analyzes the perceived benefits of Territorial Intelligence (TI) as a knowledge creation process in the context of food safety in Tunisia. The key territorial stakeholders were interviewed for their perceptions about the current and future situation of food safety. Other sources of...

  • Managing \"Risk\" in LIMS Validations. Weinberg, Sandy; Fuqua, Ronald // Scientific Computing;Oct2011 Supplement, p6 

    The article discusses the risks in the validation of laboratory information management systems (LIMS) and how to manage them. The various risks include risk of a delayed submission review, risk analysis utilized to mitigate the work and risk conceptualization. It further discusses the four-step...

  • MINŐSÍTETT ADATOKAT KEZELŐ INFORMATIKAI RENDSZEREK KOCKÁZATÉRTÉKELÉSE ÉS KOCKÁZATMENEDZSMENTJE. Zoltán, Kuris; Zoltán, Faggyas // Hadmérnök;sze2011, Vol. 6 Issue 3, p117 

    Providing for the confidentiality, integrity and availability of classified information that are handled in information systems dealing with classified information requires complex protective measures during the entire life-cycle of the system. Such measures can be efficient and cost-efficient...

  • Analýza rizik informačního systému nakládajícího s osobními údaji. Fortinová, Jana // Systémová Integrace;2012, Vol. 19 Issue 4, p41 

    Risk management is one of the most important aspects in the development of the information systems. The first step in building a secure information system is to accomplishment a risk analysis. Article describes the process of risk analysis made in building an information system using personal...

  • RISK ASSESSMENT. Understanding What Can Go Wrong. Wallace, Michael; Webber, Lawrence // Disaster Recovery Handbook;2004, p29 

    Chapter 2 of the book "Disaster Recovery Handbook: A Step-by-Step Plan to Ensure Business Continuity and Protect Vital Operations, Facilities and Assets" is presented. It discusses the context and process of risk assessment. The scope of risk is determined by the potential damage, cost of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics