Security breaches

Results: 272



#Item
211Data security / Crime prevention / Information security / National security / Public safety / Internet privacy / Privacy / Computer security / Security / Ethics

Easy Guide for Responding to Information Incidents Including Privacy Breaches The KEY to responding to information incidents is to take action as soon as possible. An information incident is when unwanted or unexpected e

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-02-06 18:19:53
212Economics / Collusion / Cournot competition / Bertrand competition / Incentive / Antoine Augustin Cournot / Game theory / Competition / Oligopoly

6 An Economics Perspective on the Sharing of Information Related to Security Breaches: Concepts and Empirical Evidence By: Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn

Add to Reading List

Source URL: www2.sims.berkeley.edu

Language: English - Date: 2002-05-19 11:16:47
213Data security / Personal life / Personally identifiable information / Data breach / Privacy Office of the U.S. Department of Homeland Security / Information security / Internet privacy / Identity theft / United States Environmental Protection Agency / Security / Computer security / Government

Procedure for Responding to Breaches of Personally Identifiable Information (PII)

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-08-08 15:09:32
214Electronic commerce / Computing / Computer law / Computer security / Business / Payment Card Industry Data Security Standard / Payment card industry / Cisco Systems / Mako Networks / Data privacy / Payment systems / Credit cards

Simplify PCI Compliance At-A-Glance Address Ongoing Security and Compliance Requirements Data breaches continue to threaten organizations’ brands,

Add to Reading List

Source URL: www.cisco.com

Language: English
215Social engineering / Computer network security / Computer crimes / Rogue software / Spyware / Computer virus / Computer worm / Scareware / Trojan horse / System software / Malware / Cybercrime

Cybercrime and law firms: The risks and dangers are real Historians may well look back and call 2013 “The year of the hacker.” There have been numerous high-profile data breaches involving major corporations and onl

Add to Reading List

Source URL: www.practicepro.ca

Language: English - Date: 2013-12-03 11:41:08
216Social engineering / Computer network security / Computer crimes / Rogue software / Spyware / Computer virus / Computer worm / Scareware / Trojan horse / System software / Malware / Cybercrime

Cybercrime and law firms: The risks and dangers are real Historians may well look back and call 2013 “The year of the hacker.” There have been numerous high-profile data breaches involving major corporations and onl

Add to Reading List

Source URL: www.practicepro.ca

Language: English - Date: 2013-12-03 11:41:08
217Computer network security / Secure communication / Data security / Identity theft / Data breach / Personally identifiable information / ChoicePoint / Credit freeze / Security breach notification laws / Security / Computer security / Crimes

Order Code RL33199 CRS Report for Congress Received through the CRS Web Data Security Breaches:

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2007-03-27 14:46:20
218Public safety / Government / Personal life / Personally identifiable information / Data breach / United States Department of Homeland Security / Government Accountability Office / Identity theft / Information security / Security / Data security / Computer security

GAO-14-34, Highlights, INFORMATION SECURITY: Agency Responses to Breaches of Personally Identifiable Information Need to Be More Consistent

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-01-08 13:00:38
219Identity / Theft / Data security / Ethics / Data breach / Identity Theft Resource Center / Identity theft / Credit card / Information security / Security / Computer security / Crimes

Identity Theft Resource Center 2011 Breach List: Breaches: 419 Exposed: 22,918,441

Add to Reading List

Source URL: www.idtheftcenter.org

Language: English - Date: 2013-07-02 11:39:14
220Data security / Computer network security / Secure communication / National security / Personally identifiable information / Data breach / Federal Information Security Management Act / Identity theft / United States Department of Homeland Security / Security / Computer security / Public safety

GAO-13-34, INFORMATION SECURITY: Agency Responses to Breaches of Personally Identifiable Information Need to Be More Consistent

Add to Reading List

Source URL: gao.gov

Language: English - Date: 2014-01-08 13:00:37
UPDATE