Data breach and encryption handbook

cover image

Where to find it

Law Library — Reference Collection (4th floor)

Call Number
KF1263.C65 D37 2011
Status
In-Library Use Only

Authors, etc.

Names:

Summary

This book takes an in-depth look at the issue of escalating data breaches and their legal ramifications. It focuses on the law and its implications, encryption technology, recognized methods of resolving a breach, and many related aspects of information security. The book also examines a number of the major data breach incidents from a variety of legal and technology perspectives, and provides instructive graphics to illustrate the methodologies hackers use to cause these breaches.

Contents

Cybercrime and escalating risks / Lucy L. Thomson -- Despite the alarming trends, data breaches are preventable / Lucy L. Thomson -- The aftermath of data breaches : potential liability and damages / Arthur E. Peabody, Jr. and Renee A. Abbott -- The underground world of online identity theft : an overview / Kimberly Kiefer Peretti -- Encrypted records : failed security / Lucy L. Thomson -- Ambiguities in state security breach notification statutes / Thomas J. Smedinghoff -- State data breach notification laws and the duty to provide information security / Lucy L. Thomson -- HITECH : the first federal data breach notification law / Arthur E. Peabody, Jr. and Lucy L. Thomson -- Breach notification and encryption : a global perspective / Ruth Hill Bro -- Encryption : the basics / Eric A. Hibbard -- Encryption best practices / Robert Thibadeau -- Circumventing data encryption : password vulnerabilities / Serge Jorgensen -- Managing cryptographic keys / Benjamin L. Tomhave -- The self-encrypting drive / Robert Thibadeau -- Encryption technologies : a practical assessment / Thomas L. Hahler -- Security best practices : the watchword is prioritize! / Lucy L. Thomson -- Responding to data breaches / Ruth Hill Bro -- Technology to prevent data leaks / Jennifer Ann Kurtz -- Insurance protection for security breaches / Lorelie S. Masters -- App. A. Security breach notification laws -- App. B. Summary of data breach notification and encryption laws / Stephen S. Wu.

Other details