Harboring Data
eBook - ePub

Harboring Data

Information Security, Law, and the Corporation

Andrea M. Matwyshyn, Andrea M. Matwyshyn

Partager le livre
  1. 368 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Harboring Data

Information Security, Law, and the Corporation

Andrea M. Matwyshyn, Andrea M. Matwyshyn

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short.

With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Harboring Data est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Harboring Data par Andrea M. Matwyshyn, Andrea M. Matwyshyn en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Law et Corporate Law. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Année
2009
ISBN
9780804772594
Édition
1
Sujet
Law
Sous-sujet
Corporate Law

Notes

Introduction

1
(Jewellap, 2007).
2
(“TJX Agrees to Class-Action Settlement,” 2007).
3
(Kerber, 2007).
4
(Gaudin, 2007).
5
(Vamosi, 2007).
6
Class-action lawsuits were filed both by consumers and by several bank associations in an attempt to recover the costs of reissuing credit card numbers compromised in the breach. (Gaudin, 2007).
7
(Ou, 2007).
8
(Pereira, 2007).
9
(Jewellap, 2007).
10
(Gartner, 2006).
11
(PGP, 2007).
12
(Fox, 2000).
13
(“More Businesses Are Buying over the Internet,” 2004). For a discussion of the consequences of technological adoption and the values embodied therein, see, for example, (M. Rogers, 2003), discussing the consequences of innovations, examining the value implications of different innovations, and arguing that technologies need to be critically evaluated from utilitarian and moral perspectives before being adopted.
14
H.R. Rep. No. 106–74, pt. 3, at 106–7 (1999). As a result of the explosion of information available via electronic services such as the internet, as well as the expansion of financial institutions through affiliations and other means as they seek to provide more and better products to consumers, the privacy of personal financial information has become an increasing concern of consumers.
15
(Winn and Wrathall, 2000).
16
For example, most law firms use document management systems to centralize work product. For a discussion of document management software, see Kennedy and Gelagin, 2003. This use of information technology facilitates knowledge management, the sharing of institutional intellectual resources such as form contracts, and control over access to certain information.
17
These attempts to centralize built in high dependencies between systems. (Labs, 2006).
18
In the context of manufacturing, this meant connecting up “islands of automation” into a single communication network.
19
(Fraudenheim, 2003).
20
(Sandeen, 2003). As a consequence of this transformation, numerous state corporate statutes have been amended to allow for email notice, virtual shareholder meetings, and internet proxy voting. (Derrick and Faught 2003; Pozen, 2003).
21
(Barabasi, 2002).
22
Databases with financial data and social security numbers became targets of choice because of their usefulness in identity theft.
23
For example, some professional spammer employees earn salaries in excess of $100,000 per year while professional spammer entity owners earn millions of dollars per year. (“Comments of Simple Nomad,” 2003).
24
(Chapman, 2007).
25
Phishing attacks are becoming increasingly sophisticated. (Desai, 2004).
26
(Federal Trade Commission, 2004). The FTC estimates that U.S. corporations lost as much as $48 billion to identity theft alone between September 2002 and September 2003. (MailFrontier, n.d.; Federal Trade Commission, 2003).
27
(“Good News,” 2004; Webb, 2004; Gartner, 2004).
28
In particular, phishing attacks usually infringe the trademarks of the spoofed entity as well as the look-and-feel of the entity’s website.
29
(“Phishing Alert,” n.d.; Valetk, 2004).
30
Spoofing is defined as sending a message to make it appear as if it is arriving from someone else. (“Spoofing,” n.d.).
31
One entity whose email is spoofed frequently is Citibank. For statistics on phishing see (Antiphishing Working Group, n.d.) For additional discussion of phishing, see (Federal Trade Commission, “Phishing Alert”; Valetk, 2004).
32
The term “phishing” is derived from the idea that internet con artists use email lures to “fish” for passwords and other personally identifiable data from the sea of internet users. The letters “ph” are a frequent replacement for “f” in hacker language, and most likely reflect an act of verbal homage to the original form of hacking, called “phreaking,” a term coined by the first hacker, John Draper, known as “Cap’n Crunch.” By 1996, hacked accounts had come to be known as “phish,” and by 1997 phish were used as currency by hackers in exchange for items such as hacking software. (Anti-Phishing Working Group, n.d.).
33
Even a highly technology-savvy consumer may have difficulty distinguishing between a phishing email and a legitimate commercial communication from an entity with whom the consumer has a preexisting relationship. (MailFrontier Phishing IQ Test II, n.d.). Even the author of this article misidentified one of the items in this quiz as fraudulent when in fact it was legitimate.
34
Monster chose not to notify the affected consumers until ten days after the discovery of the security problem, and a public relations maelstrom erupted. (“Monster. com Admits Keeping Data Breach Under Wraps,” 2007).
35
(Chapman, 2007).
36
(Hidalgo, 2007).
37
Zombie drones are security compromised machines that can be controlled remotely without the user’s knowledge for sending spam or other malicious purposes. (“Primer: Zombie Drone,” 2004; Testimony of Thomas M. Dailey, 2004).
38
For example, one Polish spam group uses more than 450,000 compromised systems, “most of them home computers running Windows high-speed connections” all over the world. (Ciphertrust, n.d.). Powerful economic incentives exist for information criminality. The black market in security-compromised machines is an international market. Recent arrests in Germany and elsewhere have provided useful information into the international market in zombie drones. (Leyden, 2004). The market in compromised machines is big international business: the price of these botNets (doSNets) was roughly $500 for 10,000 hosts during summer 2004 when the MyDoom and Blaster (the RPC exploit worm)...

Table des matiĂšres