메뉴 건너뛰기




Volumn 6, Issue 2, 2006, Pages

Offshore outsourcing - How safe is your data abroad? Overview of privacy, data protection and security

Author keywords

Data protection; Data security; Outsoursing; Privacy; Safe harbor

Indexed keywords


EID: 33750164707     PISSN: 1535167X     EISSN: 1535167X     Source Type: Journal    
DOI: 10.2202/1535-167X.1204     Document Type: Review
Times cited : (4)

References (86)
  • 2
    • 58149464382 scopus 로고    scopus 로고
    • Outsourcing and off shoring: Pushing the EuropeanModel over the hill, rather than off the cliff!
    • Institute for International Economics
    • Jacob Funk Kirkegaard (2005) Outsourcing and Off shoring: Pushing the EuropeanModel Over the Hill, Rather Than Off the Cliff ! Working Paper Series, Number WP 05 - www.iie.com, Institute for International Economics.
    • (2005) Working Paper Series , Issue.WP 05
    • Kirkegaard, J.F.1
  • 3
    • 33750147087 scopus 로고    scopus 로고
    • note
    • Working undercover Sun's investigative reporter was able to buy account details of 1,000 UK account holders of HSBC Holdings Pic, Barclays Pic and Lloyds TSB Group Plc from a former call centre worker for $5000. The former employee also offered to sell details of mortgages and medical bills. Among the information that was sold were details from credit and debit cards such as expiry dates and security numbers, which could be fraudulently used to make purchases.
  • 4
    • 84859689511 scopus 로고    scopus 로고
    • Times News Network (2005), BPO staffers hack bank A/Cs http://timesofindia.indiatimes.com/articleshow/msid-1070986,curpg-1.cms The MphasiS-Citibank funds siphoning case is particularly noteworthy because of the ease with which a bunch of young BPO employees - from middle-class, criminal-free backgrounds - allegedly pulled off a financial fraud worth nearly half-a-million dollars from accounts of New York based customers($425,000 at last count on April 20, 2005). The five accused employees of MsourcE were not expert hackers. They were not breaking through firewalls or decoding encrypted software. Instead, they are said to have identified glaring loopholes in the MphasiS system, devised a modus operandi, roped in friends from outside and executed the fraud over four months...all this, without MphasiS getting a whiff of what was happening. Being the authorised e-banking service providers to Citibank, MphasiS-MsourcE employees were privy to confidential details of various account holders.
    • (2005) BPO Staffers Hack Bank A/Cs
  • 8
    • 33750170766 scopus 로고    scopus 로고
    • Offshore outsourcing: Is your data safe?
    • April 27 2004
    • Ivy Schmerken (2004) Offshore Outsourcing: Is Your Data Safe?, Wall Street & Technology, April 27 2004
    • (2004) Wall Street & Technology
    • Schmerken, I.1
  • 9
    • 0347684347 scopus 로고    scopus 로고
    • The death of privacy
    • Michael Froomkin (2000) "The Death of Privacy" 52 Stanford Law Review 1461, 1465
    • (2000) Stanford Law Review , vol.52 , pp. 1461
    • Froomkin, M.1
  • 10
    • 0242529398 scopus 로고    scopus 로고
    • The end of privacy
    • May 1 at 21
    • "The End of Privacy" (1999) The Economist, May 1 at 21
    • (1999) The Economist
  • 14
    • 0025791156 scopus 로고
    • Software risk management: Principles and practices
    • Boehm, B. W, (1991) Software Risk Management: Principles and Practices", IEEE Software January 1991 pp 32-42
    • (1991) IEEE Software January 1991 , pp. 32-42
    • Boehm, B.W.1
  • 15
    • 0025791156 scopus 로고
    • Software risk management: Principles and practices
    • Boehm, B. W, (1991) Software Risk Management: Principles and Practices", IEEE Software January 1991 pp 32-42 ibid.
    • (1991) IEEE Software January 1991 , pp. 32-42
    • Boehm, B.W.1
  • 16
    • 77953665877 scopus 로고    scopus 로고
    • Data retention and the war against terrorism - A considered and proportionate response?
    • Rowland, D 'Data Retention and the War against Terrorism - A Considered and Proportionate Response?' 2004 (3) The Journal of Information, Law and Technology (JILT)http://www2.warwick.ac.uk/fac/soc/law2/elj/jilt/2004_3/rowland/
    • (2004) The Journal of Information, Law and Technology (JILT) , Issue.3
    • Rowland, D.1
  • 17
    • 33750168684 scopus 로고    scopus 로고
    • What stays and what goes? - Sourcing processes and jobs in the global economy, offshore outsourcing - Risks and rewards
    • Tom Davenport (2004) What Stays and What Goes? - Sourcing Processes and Jobs in the Global Economy, Offshore Outsourcing - Risks and Rewards, Conclusions Paper Presented by CFO at p. 3
    • (2004) Conclusions Paper Presented by CFO , pp. 3
    • Davenport, T.1
  • 18
    • 33750168684 scopus 로고    scopus 로고
    • What stays and what goes? - Sourcing processes and jobs in the global economy, offshore outsourcing - Risks and rewards
    • Tom Davenport (2004) What Stays and What Goes? - Sourcing Processes and Jobs in the Global Economy, Offshore Outsourcing - Risks and Rewards, Conclusions Paper Presented by CFO at p. 3 ibid.
    • (2004) Conclusions Paper Presented by CFO , pp. 3
    • Davenport, T.1
  • 19
    • 84859685329 scopus 로고    scopus 로고
    • See Offshore Outsourcing of Data Services by Insured Institutions and Associated Consumer Privacy Risks http://www.fdic.gov/regulations/examinations/ offshore/index.html
  • 20
    • 84859685330 scopus 로고    scopus 로고
    • Offshore Outsourcing of Data Services by Insured Institutions and Associated Consumer Privacy Risks http://www.fdic.gov/regulations/examinations/ offshore/index.html
  • 21
    • 33750169838 scopus 로고    scopus 로고
    • Ibid. at p 14
    • Ibid. at p 14
  • 23
    • 33750171343 scopus 로고
    • IT outsourcing privacy guidelines
    • September
    • Graham Greenleaf, 'IT Outsourcing Privacy Guidelines', Privacy Law & Policy Reporter, Volume 1, No 7, September 1994, pp 131-132
    • (1994) Privacy Law & Policy Reporter , vol.1 , Issue.7 , pp. 131-132
    • Greenleaf, G.1
  • 24
    • 33750171343 scopus 로고
    • IT outsourcing privacy guidelines
    • Graham Greenleaf, 'IT Outsourcing Privacy Guidelines', Privacy Law & Policy Reporter, Volume 1, No 7, 1994, pp 131-132 Ibid.
    • (1994) Privacy Law & Policy Reporter , vol.1 , Issue.7 , pp. 131-132
    • Greenleaf, G.1
  • 25
    • 33750167344 scopus 로고    scopus 로고
    • Cambridge University Press
    • The purpose of informal game theory is "to model the strategic structure of social situations. The most famous and perhaps pervasive strategic structure of interest to social scientists and policymakers has been the structure variously known as the Prisoner's Dilemma, collective action problem, public good problem or Tragedy of the Commons" Steven A Hetcher (2004) Cyberspace Privacy Norms, Norms in a Wired World, Cambridge University Press, pp250-304
    • (2004) Cyberspace Privacy Norms, Norms in a Wired World , pp. 250-304
    • Hetcher, S.A.1
  • 27
    • 33750193009 scopus 로고    scopus 로고
    • Cross-border outsourcing and risk management for banks
    • Kelly, Hugh C. and Nolle, Daniel E. (2003) 'Cross-border outsourcing and risk management for banks', Journal of Financial Transformation pp 63-72
    • (2003) Journal of Financial Transformation , pp. 63-72
    • Kelly, H.C.1    Nolle, D.E.2
  • 28
    • 33846947128 scopus 로고    scopus 로고
    • Offshore technology outsourcing: Overview of management and legal issues
    • in press
    • For a detail discussion on contact see Pai, A., & Basu, S. (2006) "Offshore technology outsourcing: overview of management and legal issues", International Journal of Business Process Management (in press)
    • (2006) International Journal of Business Process Management
    • Pai, A.1    Basu, S.2
  • 29
    • 0345792391 scopus 로고    scopus 로고
    • Privacy as intellectual property?
    • Pamela Samuelson (2000) Privacy as Intellectual Property? 52 Stanford Law Review at p 1125
    • (2000) Stanford Law Review , vol.52 , pp. 1125
    • Samuelson, P.1
  • 30
    • 33750173554 scopus 로고    scopus 로고
    • Communications privacy
    • Ian Walden and John Angel (eds)
    • Christopher Millard( 2005) Communications Privacy, in Ian Walden and John Angel (eds) Telecommunications Law and Regulation, at p 381
    • (2005) Telecommunications Law and Regulation , pp. 381
    • Millard, C.1
  • 34
    • 0010888307 scopus 로고    scopus 로고
    • Does privacy law?
    • Agre, PE and Rotenberg, M, 1998 Cambridge, Mass: MIT
    • Gellman R (1998) 'Does Privacy Law?' in Agre, PE and Rotenberg, M Technology and Privacy: the New Landscape, 1998 Cambridge, Mass: MIT
    • (1998) Technology and Privacy: The New Landscape
    • Gellman, R.1
  • 38
    • 33750188641 scopus 로고    scopus 로고
    • EU Directive on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of such data (95/46/EC)
    • EU Directive on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of such data (95/46/EC)
  • 40
    • 33750170486 scopus 로고    scopus 로고
    • January 28, 1981 Europe TS No 108
    • January 28, 1981 Europe TS No 108
  • 43
    • 33750165522 scopus 로고    scopus 로고
    • Article 25 EU Data Protection Directive 95/46/EC
    • Article 25 EU Data Protection Directive 95/46/EC
  • 44
    • 33750158872 scopus 로고    scopus 로고
    • ibid
    • ibid.
  • 46
    • 84979807255 scopus 로고    scopus 로고
    • The privacy fallacy: Adverse effects of europe's data protection policy in an information-driven economy
    • ISSN 0267 3649/02/$20.00
    • Lucas Bergkamp, The Privacy Fallacy: Adverse Effects Of Europe's Data Protection Policy In An Information-Driven Economy, Computer Law & Security Report Vol. 18 no. 1 2002 ISSN 0267 3649/02/$20.00
    • (2002) Computer Law & Security Report , vol.18 , Issue.1
    • Bergkamp, L.1
  • 47
    • 84859684317 scopus 로고    scopus 로고
    • https://www.privacyassociation.org/
  • 48
    • 84859685331 scopus 로고    scopus 로고
    • Binding Corporate Rules are based on Article 29 Working Party working document on transfers of personal data to third countries, applying Article 26(2) of the EU Data Protection Directive (WP 74) seehttp://europa.eu.int/comm/ justice_home/fsj/privacy/docs/wpdocs/2003/wp74_en.pdf
  • 49
    • 84859683588 scopus 로고    scopus 로고
    • http://www.iccwbo.org/home/ebitt/FINAL_ICC_BCRs_report.pdf
  • 50
    • 3042851076 scopus 로고    scopus 로고
    • An analysis of the informational privacy protection afforded by the European union and United States
    • Trade B Loring (2002) 'An Analysis of the Informational Privacy Protection afforded by the European Union and United States' 37 Texas International Law Journal 421
    • (2002) Texas International Law Journal , vol.37 , pp. 421
    • Loring, T.B.1
  • 51
    • 3042851076 scopus 로고    scopus 로고
    • An analysis of the informational privacy protection afforded by the European union and united states
    • Tracie B Loring (2002) 'An Analysis of the Informational Privacy Protection afforded by the European Union and United States' 37 Texas International Law Journal 421
    • (2002) Texas International Law Journal , vol.37 , pp. 421
    • Loring, T.B.1
  • 52
    • 33750171910 scopus 로고    scopus 로고
    • Whalen v. Roe, 429 U.S. Reports (February 22, 1977), 589-604
    • Whalen v. Roe, 429 U.S. Reports (February 22, 1977), 589-604
  • 53
    • 33750176828 scopus 로고    scopus 로고
    • Whalen v. Roe, 599-600 as citied in Jean Slemmons Stratford and Juri Stratford (1998) Data Protection and Privacy in the United States and Europe, IASSIST Quarterly
    • Whalen v. Roe, 599-600 as citied in Jean Slemmons Stratford and Juri Stratford (1998) Data Protection and Privacy in the United States and Europe, IASSIST Quarterly
  • 54
    • 33750185119 scopus 로고    scopus 로고
    • Data privacy in the US, legal issues in offshore outsourcing 4
    • CLE Program - Legal Risks of Outsourcing Abroad
    • John Nicholson, Data Privacy in the US, Legal Issues in Offshore Outsourcing 4, in CLE Program - Legal Risks of Outsourcing Abroad (2004 A.B.A. Sec. Int'l L. & Prac. Annual Meeting)
    • (2004) A.B.A. Sec. Int'l L. & Prac. Annual Meeting
    • Nicholson, J.1
  • 55
    • 0348191613 scopus 로고
    • Privacy in the information economy: A fortress or frontier for individual rights?
    • Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Rights? 44 Fed. Comm. L.J. 195, 209 (1992)
    • (1992) Fed. Comm. L.J. , vol.44 , pp. 195
    • Reidenberg, J.R.1
  • 56
    • 0348191613 scopus 로고
    • Privacy in the information economy: A fortress or frontier for individual rights?
    • Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Rights? 44 Fed. Comm. L.J. 195, 214 (1992)
    • (1992) Fed. Comm. L.J. , vol.44 , pp. 195
    • Reidenberg, J.R.1
  • 57
    • 33750157268 scopus 로고    scopus 로고
    • section 5(a) of the Federal Trade Commission Act
    • section 5(a) of the Federal Trade Commission Act
  • 59
    • 33750185119 scopus 로고    scopus 로고
    • Data privacy in the US, legal issues in offshore outsourcing 4
    • CLE Program - Legal Risks of Outsourcing Abroad
    • John Nicholson, Data Privacy in the US, Legal Issues in Offshore Outsourcing 4, in CLE Program - Legal Risks of Outsourcing Abroad (2004 A.B.A. Sec. International Law and Practice. Annual Meeting
    • (2004) A.B.A. Sec. International Law and Practice. Annual Meeting
    • Nicholson, J.1
  • 60
    • 33750179548 scopus 로고    scopus 로고
    • Justin Kent at 557
    • Justin Kent at 557
  • 62
    • 33750185119 scopus 로고    scopus 로고
    • Data privacy in the US, legal issues in offshore outsourcing 4
    • CLE Program - Legal Risks of Outsourcing Abroad
    • John Nicholson, Data Privacy in the US, Legal Issues in Offshore Outsourcing 4, in CLE Program - Legal Risks of Outsourcing Abroad (2004 A.B.A. Sec. Intentional Law and Practice Annual Meeting at 5
    • (2004) A.B.A. Sec. Intentional Law and Practice Annual Meeting at 5
    • Nicholson, J.1
  • 63
    • 33750199096 scopus 로고    scopus 로고
    • Kent 557
    • Kent 557
  • 64
    • 84859679242 scopus 로고    scopus 로고
    • HIPAA and outsourcing: The impact of business associate rules under the final privacy and security standards 12
    • Sept. 30
    • Randall E. Colson, HIPAA and Outsourcing: The Impact of Business Associate Rules under the Final Privacy and Security Standards 12 (Negotiating Tech. Outsourcing Agreements - Law Seminars Int'l, Sept. 30, 2003), at http://www.haynesboone.com/FILES/tbl_s12PublicationsHotTopics/PublicationPDF60/ 1103/09_30_2003_Colson.pdf.
    • (2003) Negotiating Tech. Outsourcing Agreements - Law Seminars Int'l
    • Colson, R.E.1
  • 66
    • 33750158582 scopus 로고    scopus 로고
    • Big brother is watching, a survey of the regulatory landscape impacting outsourcing transactions
    • John A. Funk and J. Patrick Toher (2004) Big Brother Is Watching, A Survey of the Regulatory Landscape Impacting Outsourcing Transactions, LJN's Corporate Compliance & Regulatory, Volume 2, Number 3
    • (2004) LJN's Corporate Compliance & Regulatory , vol.2 , Issue.3
    • Funk, J.A.1    Toher, J.P.2
  • 67
    • 33750191012 scopus 로고    scopus 로고
    • Beware of banks bearing gifts: Gramm-leach-bliley and the constitutionality of federal financial privacy legislation
    • Neal R. Pandozzi, Beware of Banks Bearing Gifts: Gramm-Leach-Bliley and the Constitutionality of Federal Financial Privacy Legislation, 55 University of Miami Law. Review 163, 194-97 (2001)
    • (2001) University of Miami Law. Review , vol.55 , pp. 163
    • Pandozzi, N.R.1
  • 68
    • 33750168392 scopus 로고    scopus 로고
    • Solutions for regulating offshore outsourcing in the service sector: Using the law, market, international mechanisms, and collective organization as building blocks
    • Spring
    • Justin Kent Holcombe, Solutions For Regulating Offshore Outsourcing In The Service Sector: Using The Law, Market, International Mechanisms, And Collective Organization As Building Blocks, University of Pennsylvania Journal of Labour and Employment Law, Spring 2005 at 555
    • (2005) University of Pennsylvania Journal of Labour and Employment Law , pp. 555
    • Holcombe, J.K.1
  • 69
    • 84859691197 scopus 로고    scopus 로고
    • California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
    • California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
  • 70
    • 84859685332 scopus 로고    scopus 로고
    • California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
    • California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
  • 71
    • 84859691196 scopus 로고    scopus 로고
    • 6 SAFE-ID Act, S. 2312, 108th Cong. § 3 (2004)
    • 6 SAFE-ID Act, S. 2312, 108th Cong. § 3 (2004)
  • 72
    • 33750155979 scopus 로고    scopus 로고
    • S.2312
    • S.2312
  • 76
    • 33750199658 scopus 로고    scopus 로고
    • Microsoft Corp., C-4069 (Final Order Aug. 8, 2002)
    • Microsoft Corp., C-4069 (Final Order Aug. 8, 2002)
  • 77
    • 84859683584 scopus 로고    scopus 로고
    • C. 4047, (Final Order May 8)
    • Eli Lilly and Co.,C. 4047, (Final Order May 8, 2002) http://www.ftc.gov/ speeches/swindle/perspectivesonprivacy.htm
    • (2002)
  • 80
    • 0038103693 scopus 로고    scopus 로고
    • IT outsourcing evolution, past, present and future
    • May 2003 Also see Information Technology Law 3rd Edn. by Ian Lloyd at pg 196-199
    • Jae-Nam Lee, Minh Q. Huynh, Ron Chi-Wai Kwook and Shih-Ming Pi (2003),"IT Outsourcing Evolution, Past, Present and Future," Communications of the ACM,Vol.46, No.5, May 2003 Also see Information Technology Law 3rd Edn. by Ian Lloyd at pg 196-199
    • (2003) Communications of the ACM , vol.46 , Issue.5
    • Lee, J.-N.1    Huynh, M.Q.2    Kwook, R.C.-W.3    Pi, S.-M.4
  • 82
    • 33750146442 scopus 로고    scopus 로고
    • Managing Director of Aulich & Co, the Hon Terry Aulich
    • Managing Director of Aulich & Co, the Hon Terry Aulich
  • 84
    • 33750173265 scopus 로고    scopus 로고
    • 6 September
    • Implementation of Whole-of-Government Information Technology Infrastructure Consolidation and Outsourcing Initiative, The Auditor-General Audit Report No. 9, 6 September 2000, p 231.
    • (2000) The Auditor-General Audit Report No. 9 , vol.9 , pp. 231
  • 85
    • 84859684315 scopus 로고
    • August (28 September 2000), clause 3.4
    • Outsourcing and privacy - Advice for Commonwealth agencies considering contracting out (outsourcing) information technology and other functions, August 1994, http://www.privacy.gov.au/news/p6_4_19.doc (28 September 2000), clause 3.4
    • (1994)
  • 86
    • 48849104269 scopus 로고    scopus 로고
    • Data privacy and security are a significant part of the outsourcing equation
    • June
    • Jacqueline Klosek, Data Privacy and Security Are A Significant Part of The Outsourcing Equation, Intellectual Property & Technology Law Journal June, 2005
    • (2005) Intellectual Property & Technology Law Journal
    • Klosek, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.