Cockell, Merrick
March 2009
Community Care;3/5/2009, Issue 1760, p6
The article discusses the new national database ContactPoint, which will include details of all under-18s, in Great Britain and the matters related to data security and confidentiality. It is stated that the imposition of ContactPoint may be well-intentioned but there may be problems related to breach of data. The author observes that the fact that their children's details can be routinely accessed by up to 390,000 professionals is not a fact to put anyone's mind at ease.


Related Articles

  • Another Type of Risk: Data Security Isn't Just for IT Anymore. Barron, Jacob // Business Credit;Oct2007, Vol. 109 Issue 9, p14 

    The article reports that the U.S. Congress requires organizations who are involved in the business of personal and private information to be more diligent in protecting their data against identity theft and cyber crime. The Congress has decided to update the Gramm-Leach-Bliley Act (GLBA), which...

  • Information security strategies: towards an organizational multi-strategy perspective. Ahmad, Atif; Maynard, Sean; Park, Sangseo // Journal of Intelligent Manufacturing;Apr2014, Vol. 25 Issue 2, p357 

    There considerable advice in both research and practice oriented literature on the topic of information security. Most of the discussion in literature focuses on how to prevent security attacks using technical countermeasures even though there are a number of other viable strategies such as...

  • Pressure on WEP. Wolfe, Daniel // American Banker;10/8/2008, Vol. 173 Issue 195, p5 

    The article discusses changes that are being made to data security standards for the Payment Card Industry. These changes include discontinuing the use of the wireless networking security standard the Wired Equivalent Privacy (WEP). A time line in regards to when companies are required to stop...

  • Trade groups seek E.U. clarification.  // Business Insurance;11/30/98, Vol. 32 Issue 48, p19 

    Reports that a group of insurance trade organizations has asked the US Commerce Department to clarify whether existing United States data privacy standards meet the new European Union Data Privacy Directive.

  • Systematic archiving and access to health research data: rationale, current status and way forward. Rani, Manju; Buckley, Brian S // Bulletin of the World Health Organization;Dec2012, Vol. 90 Issue 12, p932 

    Systematically archiving data from health research and large-scale surveys and ensuring access to databases offer economic benefits and can improve the accountability, efficiency and quality of scientific research. Recently, interest in data archiving and sharing has grown and, in developed...

  • 'Thumbsucking' -- not a bad childhood habit, but a growing threat to data security. Johnson, Frances // Enterprise/Salt Lake City;6/25/2007, Vol. 36 Issue 51, Special section p3 

    The article reports that thumbsucking, which is the term used for stealing sensitive personal and corporate information from computers using portable storage devices know as thumb drives, is a growing threat to data security. The term originated from Senforce, a provider of end-point security...

  • THE SECURITY CONTROL OF THE INFORMATIONAL SYSTEMS. P─âunescu, Loredana-Maria // Proceedings of the Scientific Conference AFASES;May2011, p630 

    In the present work there are presented the elements connected to the logical control, the identification, authentication and logical access to the informatics resources regarding the assurance of the informatics systems' security as well as the access to the systems, programes, and data only...

  • A LITERATURE SURVE ON DATA WAREHOUSE SECURITY ASPECTS. Raut, Sneha // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue Sup, p34 

    The goal of this paper is to give an overview of security relevant aspects of existing data warehouse solutions. Data warehousing has increasingly become an important and rather essential phenomenon in the world of enter- prise data storage. It contains confidential and sensitive data. In order...

  • Data Isn't Private Unless It's Secure. A. F. // San Diego Business Journal;5/19/2008, Vol. 29 Issue 20, Special section p4 

    The article offers suggestions to properly protect the information privacy of customers, suppliers, employees and other third parties. It suggests to do an internal auditing that examines key issues such as the data collected, how it is used, who has access, and how it is protected. It also...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics