Data Security

Data security in the United States

Data privacy and security with respect to the collection of personally identifiable information is a focus of worldwide legislation and regulation. This includes significant regulation in the European Union and legislation and compliance requirements in various jurisdictions around the world. Within the United States, several states have enacted legislation that goes beyond any federal requirements relating to the collection and use of personally identifiable information and other data. Examples include statutes adopted by the State of California and most other States that require online services to report certain breaches of the security of personal data and a California statute that requires companies to provide choice to California customers about whether their personal data is disclosed to direct marketers or to report to California customers when their personal data has been disclosed to direct marketers.

In this regard, there are a large number of legislative proposals before the United States Congress and various state legislative bodies regarding privacy issues related to our business.

Resources

See Also

  • Computer Hardware Security
  • Computer Software Security
  • Unique DNA sequences
  • Encryption of Data
  • Information Security (OIS), United States Office
  • Pretty Good Privacy (PGP)
  • Computer Hardware Security
  • Computer Software Security Critical Infrastructure
  • Information Security

Further Reading (Articles)

U.S. gets its XBRL in gear: SEC, FDIC OK tagged data.(Securities and Exchange Commission, Federal Deposit Insurance Corp.), Accounting Today; March 14, 2005; Cheney, Glenn

SEC evaluates accepting filings using XBRL tagged data.(Securities and Exchange Commission’s Extensible Business Reporting Language initiative), CPA Letter; September 1, 2004

Disclosure Inc. plans to rescue service carrying SEC data. (Securities and Exchange Commission)(Brief Article), American Banker; August 31, 1995; Tracey, Brian

Holding the keys. (Data Securities International, key recovery center) (Company Operations), Software Magazine; April 1, 1997

Data Security Software encrypts and protects virtual machines.(HighCloud Security Unveils Virtual Machine-Centric Security for the Cloud and the Virtualized Data Center), Product News Network; October 28, 2011

Modern Data Security, Archives of Pathology & Laboratory Medicine; March 1, 2004; Klein, Robert R III Mount, David W Nagle, Ray B

FTC Data Security Authority Confirmed, for Now: Wyndham’s Motion to Dismiss Denied, Mondaq Business Briefing; April 16, 2014; Larose, Cynthia

Data Security Software protects credit card data.(Vantiv Introduces Comprehensive Security Solution), Product News Network; January 18, 2012

Data Security Software protects information in MS SharePoint.(Imperva Introduces Data Security for Microsoft SharePoint), Product News Network; October 13, 2011

Data security: more than protecting bits and bytes: companies store and transmit huge volumes of data, including customer and personnel records, intellectual property, trade secrets and other proprietary assets. Securing this information against malicious attacks, accidents or negligence is vital to their operations.(TECHNOLOGY), Alaska Business Monthly; April 1, 2011; Barbour, Tracy

Convergence of Data Security Priorities on the Horizon., Information Technology Business; September 8, 2009

Data Security: The Time Is Now., Mondaq Business Briefing; July 19, 2005

Guidance on Personal Data Security Breaches: When Obliged to Notify and When Exempt, Mondaq Business Briefing; May 19, 2014; Moerel, Lokke

Massachusetts Data Security Regulations Impose Strict Controls On Employers And Retailers, Impact Outsourcing Relationships., Mondaq Business Briefing; October 30, 2008; McLaughlin, Peter

Data Security: Avoiding The Limelight., Mondaq Business Briefing; December 13, 2007

FTC TESTIFIES ON DATA SECURITY, US Fed News Service, Including US State News; June 16, 2011

Will Unearthing the FTC’s Data Security Standards Help the Health Care Industry?, Mondaq Business Briefing; May 8, 2014; Litten, Elizabeth

Pegasystems Simplifies and Strengthens Data Security with Vormetric, Information Technology Newsweekly; March 26, 2013

Vormetric Unveils Next-Generation Data Security Management for Enterprises., Information Technology Business; May 26, 2009

Ten Ways to Boost Data Security, Information Today; November 1, 2006; Britt, Phillip


Posted

in

, ,

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *