As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.LinkedIn. aAbout LinkedIn.a March 20, 2008. http://www.linkedin.com/static?key= company_info. Livingstone, Sonia. aTaking ... January 4, 2006. http://www.eff.org/ IP/DRM/emi.pdf. Lohr ... Manual ofPatent Examining Procedure 8th ed. (rev.
|Publisher||:||Stanford University Press - 2009-10-06|