Harboring Data: Information Security, Law, and the Corporation
Harboring Data: Information Security, Law, and the Corporation
Cite
Abstract
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, this book reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, where breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.
-
Front Matter
-
Section I Introducing Corporate Information Security
-
Section II The Dual Nature of Information—information as a Consumer and Corporate Asset
-
2
The Information Vulnerability Landscape: Compromising Positions: Organizational and Hacker Responsibility for Exposed Digital Records
Kris Erickson andPhilip N. Howard
-
3
Reporting of Information Security Breaches: A Reporter's View: Corporate Information Security and the Impact of Data Breach Notification Laws
Kim Zetter
-
4
Information Security and Patents: Embedding Thickets in Information Security? Cryptography Patenting and Strategic Implications for Information Technology
Greg R. Vetter
-
5
Information Security and Trade Secrets: Dangers from the Inside: Employees as Threats to Trade Secrets
Elizabeth A. Rowe
-
2
The Information Vulnerability Landscape: Compromising Positions: Organizational and Hacker Responsibility for Exposed Digital Records
-
Section III U.S. Corporate Information Security Regulation and Its Shortcomings
-
6
Information Security of Health Data: Electronic Health Information Security and Privacy
Sharona Hoffman andAndy Podgurski
-
7
Information Security of Financial Data: Quasi-Secrets: The Nature of Financial Information and Its Implications for Data Security
Cem Paya
-
8
Information Security of Children's Data: From “Ego” to “Social Comparison”—Cultural Transmission and Child Data Protection Policies and laws in a Digital Age
Diana T. Slaughter-Defoe andZhenlin Wang
-
6
Information Security of Health Data: Electronic Health Information Security and Privacy
-
Section IV The Future of Corporate Information Security and Law
-
9
Information Security and Contracts: Contracting Insecurity: Software License Terms That Undermine Information Security
Jennifer A. Chandler
-
10
Information Security, Law, and Data-Intensive Business Models: Data Control and Social Networking: Irreconcilable Ideas?
Lilian Edwards andIan Brown
-
Conclusion
-
9
Information Security and Contracts: Contracting Insecurity: Software License Terms That Undermine Information Security
-
End Matter
Sign in
Get help with accessPersonal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
Institutional access
- Sign in through your institution
- Sign in with a library card Sign in with username/password Recommend to your librarian
Institutional account management
Sign in as administratorPurchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
November 2022 | 1 |
January 2023 | 1 |
January 2023 | 1 |
June 2023 | 2 |
July 2023 | 2 |
July 2023 | 3 |
July 2023 | 1 |
July 2023 | 1 |
July 2023 | 1 |
July 2023 | 1 |
July 2023 | 1 |
July 2023 | 3 |
July 2023 | 1 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 3 |
November 2023 | 2 |
November 2023 | 2 |
November 2023 | 3 |
November 2023 | 2 |
November 2023 | 3 |
December 2023 | 1 |
January 2024 | 2 |
February 2024 | 3 |
March 2024 | 2 |
March 2024 | 3 |
March 2024 | 2 |
March 2024 | 2 |
March 2024 | 1 |
March 2024 | 2 |
March 2024 | 3 |
March 2024 | 3 |
March 2024 | 1 |
March 2024 | 2 |
March 2024 | 2 |
March 2024 | 2 |
March 2024 | 4 |
March 2024 | 2 |
March 2024 | 2 |
March 2024 | 2 |
March 2024 | 2 |
March 2024 | 2 |
April 2024 | 1 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.