TITLE

Computers and privacy: call for independent protection body

PUB. DATE
November 1977
SOURCE
Accountancy;Nov77, Vol. 88 Issue 1011, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the joint statement issued by The British Computer Society, The Computing Services Association and The Data Processing Management Association on the establishment of a licensing body. Section of the government to counter the improper use personal data by computer users; Legal security measures; Issue of political will as an obstacle.
ACCESSION #
5945821

 

Related Articles

  • Computers and privacy: call for independent protection body.  // Accountancy;Nov77, Vol. 88 Issue 1011, p20 

    Reports on the joint statement issued by The British Computer Society, The Computing Services Association and The Data Processing Management Association on the establishment of a licensing body. Section of the government to counter the improper use personal data by computer users; Legal...

  • Security funds close to being slashed. English, Erin // Australian Personal Computer;Jun95, Vol. 16 Issue 6, p20 

    Reports on the US Congress' plan to reduce funding for computer security research and development programs. Security research cuts' impact on advances in electronic commerce and the United States' success in the world market; Budget cuts in the area of cryptography and encryption.

  • Hackers of the world, unite! Schwartz, J. // Newsweek;7/2/1990, Vol. 116 Issue 1, p36 

    Reports on the government crackdown on computer tampering and the announcement due next week of a new foundation intended to combat computer phobia and provide legal aid from some people snared in the `hacker dragnet.' Investigation is out of proportion; Mitch Kapor, founder of Lotus...

  • Security termed critical component of upcoming digital revolution. McGuire, Mike // PC Week;7/19/93, Vol. 10 Issue 28, p135 

    Reports on the warning issued by a group of industry executives participating in a panel on security and copyright protection at Seybold Digital World Conference. Protection of intellectual property against pranksters and computer criminals; RSA Data Security Inc.'s encryption technology;...

  • Norm Proselytizers Create a Privacy Entitlement In Cyberspace. Hetcher, Steven A. // Berkeley Technology Law Journal;Summer2001 Supplement 1, Vol. 16, p877 

    Explores an important development in the informal regulation of online privacy. Significance of privacy norm proselytizers; Examination on the non-moral social meaning of the personal data collection practices; Emphasis on the support of other norm entrepreneurs.

  • Getting cybersecurity right. Johnson, Ron // Hill;3/27/2012, Vol. 19 Issue 39, p20 

    The article offers the author's insights regarding the move of the U.S. government to address the threat of cyberterrorism in the country's computer system through supporting proposals in U.S. Congress which allow the federal government to mandate regulations to the private sectors.

  • Threat posed by hackers largely imaginary. Steinberg, Steve G. // Inside Tucson Business;7/29/96, Vol. 6 Issue 18, p13 

    Comments on the perceived and actual risk posed by hackers. Use of hackers as a bogeyman to justify the `Manhattan Project'; Cyber threats cited by US Deputy Attorney General Jamie Gorelick at a government conference on `National Security in the Information Age'; Absolute security as outrageous.

  • PROMISE OF SECURITY. Coffee, Peter // eWeek;1/20/2003, Vol. 20 Issue 3, p37 

    Reports on the efforts of the U.S. government in implementing effective computer network security. Concern of private-sector information technology firms about the impact of government rules for network security; Problem threatening the effectiveness of all perimeter-focused security systems;...

  • Privacy in a Wired World. Munro, Neil // National Journal;10/24/98, Vol. 30 Issue 43, p2498 

    Addresses the issue of privacy of personal data in computers in the United States. Efforts being taken by the government to solve privacy issues; Privacy guidelines of some organizations; Restrictive legislation for the health care industry. INSET: Look who's allied with the ACLU.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics