The encryption factor

Hoskins, Juliet
October 2000
Financial Management;Oct2000, p18
Trade Publication
Talks about the privacy of personal data of web customers. Concept of privacy; Similarity of the argument over privacy and authentication with encryption; Divergence that has caused problems for those sending data from Europe to the United States.


Related Articles

  • Keying into new computer privacy law. Haney, Brian // Business Journal Serving Fresno & the Central San Joaquin Valley;5/30/2003, Issue 323093, p7 

    Describes the provisions under the California privacy law, SB 1386, which goes into effect on July 1, 2003. Security breach on an electronic database, owned, licensed or maintained; Personal information.

  • Global privacy project focuses on credit card industry.  // Credit World;Nov/Dec96, Vol. 85 Issue 2, p30 

    Highlights topics discussed at the Managing Privacy in Cyberspace and Across National Borders conference sponsored by Privacy & American Business on October 8-10, 1996 in Washington D.C. European Union's adoption of the Data Protection Directive; Formation of the Global Business Privacy Project...

  • Avoiding a charge of invasion of privacy.  // Supervisory Management;Sep95, Vol. 40 Issue 9, p4 

    Provides tips for supervisors on defending against a charge of invasion of privacy when monitoring employees. Posting of signs in appropriate places to alert employees that monitoring will take place; Sample message used by Seyfarth, Shaw, Fairweather & Geraldson, a Chicago, Illinois law firm.

  • WHAT THE WEB KNOWS ABOUT YOU.  // Web User;8/8/2013, Issue 324, p44 

    The article offers information on security of the data on computers from any external theft and offers step by step instructions for installing a software Disconnect to stop snoopers and using PrivacyFix for privacy settings.

  • Reset anything IN ONE CLICK.  // Web User;8/8/2013, Issue 324, p52 

    The article lists eight easy ways to reset hardware and software for protecting privacy as passwords, searches and downloads including using factory restore option in windows 8 operating system, resetting internet browsers and deleting browsers data.

  • Get Ready to Hire a Chief Privacy Officer. Fitz-James, Michael // Corporate Legal Times;Jun2001, Vol. 11 Issue 115, pbwb14 

    Reports the role of Chief Privacy Officers on data-protection standards in North America. Expectations of the customers and employees on the data-protection standards; Collection and storage of personal data; Disclosure of personal information in the course of commercial activities.

  • Let's Protect Data Privacy-- by Curbing Govt. Agencies. Armey, Dick // American Banker;4/20/2001, Vol. 166 Issue 76, p17 

    Presents excerpts from a letter by the United States House majority leader to Republicans about data privacy. Privacy issues arising from new forms of communication including the Internet; Challenges in protecting sensitive information; Privacy practices of the federal government.

  • Untitled. Ito, Joichi // J@pan Inc.;Dec99, Issue 2, p44 

    Focuses on data protection and privacy laws in Japan. Information on the nature of Japanese laws on stealing information; Risk of invasion of privacy in digital information; Issue on personal location information among mobile phone users; Community and services on the Internet that support...

  • Big Data: New peer-reviewed journal on big data launching in Fall 2012.  // Biomedical Market Newsletter;7/19/2012, Vol. 21, p1 

    The article mentions that as over two quintillion bytes of data is created by us every day, global leaders in academia, industry, and government are trying to organize, store and protect this vast amount of information.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics