Yates, Stephen
July 2003
Hospitality Upgrade;Summer2003, p126
Trade Publication
The author discusses the California Civil Code 1798.80-1798.84 that will take effect on July 1, 2003. It states that the Code will force businesses to tell their clients when their private information has been stolen or hacked. It offers a basic four-step program that can provide a well-balanced plan to improve the environment that protects the privacy of the client and reduce the business risks.


Related Articles

  • Learn strategies for managing cyber risk.  // Business Insurance;6/6/2011, Vol. 45 Issue 23, p20 

    The article discusses the risks, costs and strategies of identity theft and data breaches that have affected 10 million U.S. residents costing about 50 billion dollars in unnecessary business expenses.

  • RAISING RED FLAGS. Feddis, Nessa; Kenneally, Steve; Riese, Richard // Community Banker;Jun2009, Vol. 18 Issue 6, p27 

    The article explains the identification and response procedures of a bank's Identity Theft Prevention Program to address red flags on identity theft. Identifying red flags in a bank regards risk factors such as the types of covered accounts it offers and the methods it provides to customers to...

  • Research outsourcing contract pitfalls to reap maximum rewards. Basu, Dalim // Computer Weekly;4/12/2005, p26 

    The article focuses on issues concerning outsourcing. Outsourcing is often presented as the answer to avoiding these problems, but the reality for most organizations will be far more complex. Unclear business objectives, inadequate requirements, poor scoping, low executive support and lack of...

  • Canada to address privacy law failings. Hummerston, Gemma // Precision Marketing;12/1/2006, Vol. 18 Issue 48, p9 

    The article reports on the action of the Canadian government to reviews its privacy laws despite the legislation's failing condition to protect businesses and consumers in Canada. The initiative to reexamine the Personal Information Protection and Electronic Documents Act is in answer to the...

  • Correction.  // American Banker;8/1/2005, Vol. 170 Issue 146, p20 

    Presents a correction of an error in the July 25th paper in the Washington People column on page 3 overstating the differences between two House bills that would require consumer notification of data security breaches. How different notices would be required under the Pryce-Castle-Moore bill and...

  • Privacy is Good Business. Harper, Karen // Pharmaceutical Executive;Jul2002, Vol. 22 Issue 7, p60 

    Examines the benefits of privacy risk-management programs for pharmaceutical companies and outlines the basic structure of the initiatives. Role of risk management in preventing privacy-related lawsuits; Views of pharmaceutical executives on the privacy provisions of the Health Insurance...

  • Protecting the privacy rights of all Canadians.  // CA Magazine;Apr2002, Vol. 135 Issue 3, p45 

    Focuses on the protection of privacy for Canadian consumers through the enactment of the Personal Information Protection and Electronic Documents Act (PIPEDA). Recognition of the rights of individuals for collection ,use and disclosure; Role of chartered accountants on the management of privacy...

  • Jeepers, creepers. Black // Treasury & Risk Management;Jul99, Vol. 9 Issue 5, p14 

    Focuses on the right of privacy in the workplace as an issue for risk managers in United States. Appropriate spying on workers to safeguard corporate interests; Placement of a hidden camera outside the men's locker room as basis of lawsuit filed by locomotive engineers; Locker rooms as a...

  • Safe virtual environments. Ricart, Philippe; Théoret, Pascal // CA Magazine;Aug2011, Vol. 144 Issue 6, p39 

    The article offers tips on how to furnish safe virtual environment in Canada. It mentions that information technology (IT) access and identity management play a vital role in the imposition of strict internal controls of companies. Risk-based tips in identity management include identifying...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics