-
2
-
-
58149464382
-
Outsourcing and off shoring: Pushing the EuropeanModel over the hill, rather than off the cliff!
-
Institute for International Economics
-
Jacob Funk Kirkegaard (2005) Outsourcing and Off shoring: Pushing the EuropeanModel Over the Hill, Rather Than Off the Cliff ! Working Paper Series, Number WP 05 - www.iie.com, Institute for International Economics.
-
(2005)
Working Paper Series
, Issue.WP 05
-
-
Kirkegaard, J.F.1
-
3
-
-
33750147087
-
-
note
-
Working undercover Sun's investigative reporter was able to buy account details of 1,000 UK account holders of HSBC Holdings Pic, Barclays Pic and Lloyds TSB Group Plc from a former call centre worker for $5000. The former employee also offered to sell details of mortgages and medical bills. Among the information that was sold were details from credit and debit cards such as expiry dates and security numbers, which could be fraudulently used to make purchases.
-
-
-
-
4
-
-
84859689511
-
-
Times News Network (2005), BPO staffers hack bank A/Cs http://timesofindia.indiatimes.com/articleshow/msid-1070986,curpg-1.cms The MphasiS-Citibank funds siphoning case is particularly noteworthy because of the ease with which a bunch of young BPO employees - from middle-class, criminal-free backgrounds - allegedly pulled off a financial fraud worth nearly half-a-million dollars from accounts of New York based customers($425,000 at last count on April 20, 2005). The five accused employees of MsourcE were not expert hackers. They were not breaking through firewalls or decoding encrypted software. Instead, they are said to have identified glaring loopholes in the MphasiS system, devised a modus operandi, roped in friends from outside and executed the fraud over four months...all this, without MphasiS getting a whiff of what was happening. Being the authorised e-banking service providers to Citibank, MphasiS-MsourcE employees were privy to confidential details of various account holders.
-
(2005)
BPO Staffers Hack Bank A/Cs
-
-
-
8
-
-
33750170766
-
Offshore outsourcing: Is your data safe?
-
April 27 2004
-
Ivy Schmerken (2004) Offshore Outsourcing: Is Your Data Safe?, Wall Street & Technology, April 27 2004
-
(2004)
Wall Street & Technology
-
-
Schmerken, I.1
-
9
-
-
0347684347
-
The death of privacy
-
Michael Froomkin (2000) "The Death of Privacy" 52 Stanford Law Review 1461, 1465
-
(2000)
Stanford Law Review
, vol.52
, pp. 1461
-
-
Froomkin, M.1
-
10
-
-
0242529398
-
The end of privacy
-
May 1 at 21
-
"The End of Privacy" (1999) The Economist, May 1 at 21
-
(1999)
The Economist
-
-
-
14
-
-
0025791156
-
Software risk management: Principles and practices
-
Boehm, B. W, (1991) Software Risk Management: Principles and Practices", IEEE Software January 1991 pp 32-42
-
(1991)
IEEE Software January 1991
, pp. 32-42
-
-
Boehm, B.W.1
-
15
-
-
0025791156
-
Software risk management: Principles and practices
-
Boehm, B. W, (1991) Software Risk Management: Principles and Practices", IEEE Software January 1991 pp 32-42 ibid.
-
(1991)
IEEE Software January 1991
, pp. 32-42
-
-
Boehm, B.W.1
-
16
-
-
77953665877
-
Data retention and the war against terrorism - A considered and proportionate response?
-
Rowland, D 'Data Retention and the War against Terrorism - A Considered and Proportionate Response?' 2004 (3) The Journal of Information, Law and Technology (JILT)http://www2.warwick.ac.uk/fac/soc/law2/elj/jilt/2004_3/rowland/
-
(2004)
The Journal of Information, Law and Technology (JILT)
, Issue.3
-
-
Rowland, D.1
-
17
-
-
33750168684
-
What stays and what goes? - Sourcing processes and jobs in the global economy, offshore outsourcing - Risks and rewards
-
Tom Davenport (2004) What Stays and What Goes? - Sourcing Processes and Jobs in the Global Economy, Offshore Outsourcing - Risks and Rewards, Conclusions Paper Presented by CFO at p. 3
-
(2004)
Conclusions Paper Presented by CFO
, pp. 3
-
-
Davenport, T.1
-
18
-
-
33750168684
-
What stays and what goes? - Sourcing processes and jobs in the global economy, offshore outsourcing - Risks and rewards
-
Tom Davenport (2004) What Stays and What Goes? - Sourcing Processes and Jobs in the Global Economy, Offshore Outsourcing - Risks and Rewards, Conclusions Paper Presented by CFO at p. 3 ibid.
-
(2004)
Conclusions Paper Presented by CFO
, pp. 3
-
-
Davenport, T.1
-
19
-
-
84859685329
-
-
See Offshore Outsourcing of Data Services by Insured Institutions and Associated Consumer Privacy Risks http://www.fdic.gov/regulations/examinations/ offshore/index.html
-
-
-
-
20
-
-
84859685330
-
-
Offshore Outsourcing of Data Services by Insured Institutions and Associated Consumer Privacy Risks http://www.fdic.gov/regulations/examinations/ offshore/index.html
-
-
-
-
21
-
-
33750169838
-
-
Ibid. at p 14
-
Ibid. at p 14
-
-
-
-
23
-
-
33750171343
-
IT outsourcing privacy guidelines
-
September
-
Graham Greenleaf, 'IT Outsourcing Privacy Guidelines', Privacy Law & Policy Reporter, Volume 1, No 7, September 1994, pp 131-132
-
(1994)
Privacy Law & Policy Reporter
, vol.1
, Issue.7
, pp. 131-132
-
-
Greenleaf, G.1
-
24
-
-
33750171343
-
IT outsourcing privacy guidelines
-
Graham Greenleaf, 'IT Outsourcing Privacy Guidelines', Privacy Law & Policy Reporter, Volume 1, No 7, 1994, pp 131-132 Ibid.
-
(1994)
Privacy Law & Policy Reporter
, vol.1
, Issue.7
, pp. 131-132
-
-
Greenleaf, G.1
-
25
-
-
33750167344
-
-
Cambridge University Press
-
The purpose of informal game theory is "to model the strategic structure of social situations. The most famous and perhaps pervasive strategic structure of interest to social scientists and policymakers has been the structure variously known as the Prisoner's Dilemma, collective action problem, public good problem or Tragedy of the Commons" Steven A Hetcher (2004) Cyberspace Privacy Norms, Norms in a Wired World, Cambridge University Press, pp250-304
-
(2004)
Cyberspace Privacy Norms, Norms in a Wired World
, pp. 250-304
-
-
Hetcher, S.A.1
-
28
-
-
33846947128
-
Offshore technology outsourcing: Overview of management and legal issues
-
in press
-
For a detail discussion on contact see Pai, A., & Basu, S. (2006) "Offshore technology outsourcing: overview of management and legal issues", International Journal of Business Process Management (in press)
-
(2006)
International Journal of Business Process Management
-
-
Pai, A.1
Basu, S.2
-
29
-
-
0345792391
-
Privacy as intellectual property?
-
Pamela Samuelson (2000) Privacy as Intellectual Property? 52 Stanford Law Review at p 1125
-
(2000)
Stanford Law Review
, vol.52
, pp. 1125
-
-
Samuelson, P.1
-
30
-
-
33750173554
-
Communications privacy
-
Ian Walden and John Angel (eds)
-
Christopher Millard( 2005) Communications Privacy, in Ian Walden and John Angel (eds) Telecommunications Law and Regulation, at p 381
-
(2005)
Telecommunications Law and Regulation
, pp. 381
-
-
Millard, C.1
-
34
-
-
0010888307
-
Does privacy law?
-
Agre, PE and Rotenberg, M, 1998 Cambridge, Mass: MIT
-
Gellman R (1998) 'Does Privacy Law?' in Agre, PE and Rotenberg, M Technology and Privacy: the New Landscape, 1998 Cambridge, Mass: MIT
-
(1998)
Technology and Privacy: The New Landscape
-
-
Gellman, R.1
-
38
-
-
33750188641
-
-
EU Directive on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of such data (95/46/EC)
-
EU Directive on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of such data (95/46/EC)
-
-
-
-
40
-
-
33750170486
-
-
January 28, 1981 Europe TS No 108
-
January 28, 1981 Europe TS No 108
-
-
-
-
43
-
-
33750165522
-
-
Article 25 EU Data Protection Directive 95/46/EC
-
Article 25 EU Data Protection Directive 95/46/EC
-
-
-
-
44
-
-
33750158872
-
-
ibid
-
ibid.
-
-
-
-
46
-
-
84979807255
-
The privacy fallacy: Adverse effects of europe's data protection policy in an information-driven economy
-
ISSN 0267 3649/02/$20.00
-
Lucas Bergkamp, The Privacy Fallacy: Adverse Effects Of Europe's Data Protection Policy In An Information-Driven Economy, Computer Law & Security Report Vol. 18 no. 1 2002 ISSN 0267 3649/02/$20.00
-
(2002)
Computer Law & Security Report
, vol.18
, Issue.1
-
-
Bergkamp, L.1
-
47
-
-
84859684317
-
-
https://www.privacyassociation.org/
-
-
-
-
48
-
-
84859685331
-
-
Binding Corporate Rules are based on Article 29 Working Party working document on transfers of personal data to third countries, applying Article 26(2) of the EU Data Protection Directive (WP 74) seehttp://europa.eu.int/comm/ justice_home/fsj/privacy/docs/wpdocs/2003/wp74_en.pdf
-
-
-
-
49
-
-
84859683588
-
-
http://www.iccwbo.org/home/ebitt/FINAL_ICC_BCRs_report.pdf
-
-
-
-
50
-
-
3042851076
-
An analysis of the informational privacy protection afforded by the European union and United States
-
Trade B Loring (2002) 'An Analysis of the Informational Privacy Protection afforded by the European Union and United States' 37 Texas International Law Journal 421
-
(2002)
Texas International Law Journal
, vol.37
, pp. 421
-
-
Loring, T.B.1
-
51
-
-
3042851076
-
An analysis of the informational privacy protection afforded by the European union and united states
-
Tracie B Loring (2002) 'An Analysis of the Informational Privacy Protection afforded by the European Union and United States' 37 Texas International Law Journal 421
-
(2002)
Texas International Law Journal
, vol.37
, pp. 421
-
-
Loring, T.B.1
-
52
-
-
33750171910
-
-
Whalen v. Roe, 429 U.S. Reports (February 22, 1977), 589-604
-
Whalen v. Roe, 429 U.S. Reports (February 22, 1977), 589-604
-
-
-
-
53
-
-
33750176828
-
-
Whalen v. Roe, 599-600 as citied in Jean Slemmons Stratford and Juri Stratford (1998) Data Protection and Privacy in the United States and Europe, IASSIST Quarterly
-
Whalen v. Roe, 599-600 as citied in Jean Slemmons Stratford and Juri Stratford (1998) Data Protection and Privacy in the United States and Europe, IASSIST Quarterly
-
-
-
-
54
-
-
33750185119
-
Data privacy in the US, legal issues in offshore outsourcing 4
-
CLE Program - Legal Risks of Outsourcing Abroad
-
John Nicholson, Data Privacy in the US, Legal Issues in Offshore Outsourcing 4, in CLE Program - Legal Risks of Outsourcing Abroad (2004 A.B.A. Sec. Int'l L. & Prac. Annual Meeting)
-
(2004)
A.B.A. Sec. Int'l L. & Prac. Annual Meeting
-
-
Nicholson, J.1
-
55
-
-
0348191613
-
Privacy in the information economy: A fortress or frontier for individual rights?
-
Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Rights? 44 Fed. Comm. L.J. 195, 209 (1992)
-
(1992)
Fed. Comm. L.J.
, vol.44
, pp. 195
-
-
Reidenberg, J.R.1
-
56
-
-
0348191613
-
Privacy in the information economy: A fortress or frontier for individual rights?
-
Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Rights? 44 Fed. Comm. L.J. 195, 214 (1992)
-
(1992)
Fed. Comm. L.J.
, vol.44
, pp. 195
-
-
Reidenberg, J.R.1
-
57
-
-
33750157268
-
-
section 5(a) of the Federal Trade Commission Act
-
section 5(a) of the Federal Trade Commission Act
-
-
-
-
59
-
-
33750185119
-
Data privacy in the US, legal issues in offshore outsourcing 4
-
CLE Program - Legal Risks of Outsourcing Abroad
-
John Nicholson, Data Privacy in the US, Legal Issues in Offshore Outsourcing 4, in CLE Program - Legal Risks of Outsourcing Abroad (2004 A.B.A. Sec. International Law and Practice. Annual Meeting
-
(2004)
A.B.A. Sec. International Law and Practice. Annual Meeting
-
-
Nicholson, J.1
-
60
-
-
33750179548
-
-
Justin Kent at 557
-
Justin Kent at 557
-
-
-
-
62
-
-
33750185119
-
Data privacy in the US, legal issues in offshore outsourcing 4
-
CLE Program - Legal Risks of Outsourcing Abroad
-
John Nicholson, Data Privacy in the US, Legal Issues in Offshore Outsourcing 4, in CLE Program - Legal Risks of Outsourcing Abroad (2004 A.B.A. Sec. Intentional Law and Practice Annual Meeting at 5
-
(2004)
A.B.A. Sec. Intentional Law and Practice Annual Meeting at 5
-
-
Nicholson, J.1
-
63
-
-
33750199096
-
-
Kent 557
-
Kent 557
-
-
-
-
64
-
-
84859679242
-
HIPAA and outsourcing: The impact of business associate rules under the final privacy and security standards 12
-
Sept. 30
-
Randall E. Colson, HIPAA and Outsourcing: The Impact of Business Associate Rules under the Final Privacy and Security Standards 12 (Negotiating Tech. Outsourcing Agreements - Law Seminars Int'l, Sept. 30, 2003), at http://www.haynesboone.com/FILES/tbl_s12PublicationsHotTopics/PublicationPDF60/ 1103/09_30_2003_Colson.pdf.
-
(2003)
Negotiating Tech. Outsourcing Agreements - Law Seminars Int'l
-
-
Colson, R.E.1
-
66
-
-
33750158582
-
Big brother is watching, a survey of the regulatory landscape impacting outsourcing transactions
-
John A. Funk and J. Patrick Toher (2004) Big Brother Is Watching, A Survey of the Regulatory Landscape Impacting Outsourcing Transactions, LJN's Corporate Compliance & Regulatory, Volume 2, Number 3
-
(2004)
LJN's Corporate Compliance & Regulatory
, vol.2
, Issue.3
-
-
Funk, J.A.1
Toher, J.P.2
-
67
-
-
33750191012
-
Beware of banks bearing gifts: Gramm-leach-bliley and the constitutionality of federal financial privacy legislation
-
Neal R. Pandozzi, Beware of Banks Bearing Gifts: Gramm-Leach-Bliley and the Constitutionality of Federal Financial Privacy Legislation, 55 University of Miami Law. Review 163, 194-97 (2001)
-
(2001)
University of Miami Law. Review
, vol.55
, pp. 163
-
-
Pandozzi, N.R.1
-
68
-
-
33750168392
-
Solutions for regulating offshore outsourcing in the service sector: Using the law, market, international mechanisms, and collective organization as building blocks
-
Spring
-
Justin Kent Holcombe, Solutions For Regulating Offshore Outsourcing In The Service Sector: Using The Law, Market, International Mechanisms, And Collective Organization As Building Blocks, University of Pennsylvania Journal of Labour and Employment Law, Spring 2005 at 555
-
(2005)
University of Pennsylvania Journal of Labour and Employment Law
, pp. 555
-
-
Holcombe, J.K.1
-
69
-
-
84859691197
-
-
California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
-
California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
-
-
-
-
70
-
-
84859685332
-
-
California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
-
California Bill No. SB 1492 "An Act to add Chapter 6.5 to Part 2.6 of Division 1 of the Civil Code, relating to confidential information" Passed by Senate August 27, 2004, Vetoed by Governor September 29, 2004
-
-
-
-
71
-
-
84859691196
-
-
6 SAFE-ID Act, S. 2312, 108th Cong. § 3 (2004)
-
6 SAFE-ID Act, S. 2312, 108th Cong. § 3 (2004)
-
-
-
-
72
-
-
33750155979
-
-
S.2312
-
S.2312
-
-
-
-
76
-
-
33750199658
-
-
Microsoft Corp., C-4069 (Final Order Aug. 8, 2002)
-
Microsoft Corp., C-4069 (Final Order Aug. 8, 2002)
-
-
-
-
77
-
-
84859683584
-
-
C. 4047, (Final Order May 8)
-
Eli Lilly and Co.,C. 4047, (Final Order May 8, 2002) http://www.ftc.gov/ speeches/swindle/perspectivesonprivacy.htm
-
(2002)
-
-
-
80
-
-
0038103693
-
IT outsourcing evolution, past, present and future
-
May 2003 Also see Information Technology Law 3rd Edn. by Ian Lloyd at pg 196-199
-
Jae-Nam Lee, Minh Q. Huynh, Ron Chi-Wai Kwook and Shih-Ming Pi (2003),"IT Outsourcing Evolution, Past, Present and Future," Communications of the ACM,Vol.46, No.5, May 2003 Also see Information Technology Law 3rd Edn. by Ian Lloyd at pg 196-199
-
(2003)
Communications of the ACM
, vol.46
, Issue.5
-
-
Lee, J.-N.1
Huynh, M.Q.2
Kwook, R.C.-W.3
Pi, S.-M.4
-
82
-
-
33750146442
-
-
Managing Director of Aulich & Co, the Hon Terry Aulich
-
Managing Director of Aulich & Co, the Hon Terry Aulich
-
-
-
-
84
-
-
33750173265
-
-
6 September
-
Implementation of Whole-of-Government Information Technology Infrastructure Consolidation and Outsourcing Initiative, The Auditor-General Audit Report No. 9, 6 September 2000, p 231.
-
(2000)
The Auditor-General Audit Report No. 9
, vol.9
, pp. 231
-
-
-
85
-
-
84859684315
-
-
August (28 September 2000), clause 3.4
-
Outsourcing and privacy - Advice for Commonwealth agencies considering contracting out (outsourcing) information technology and other functions, August 1994, http://www.privacy.gov.au/news/p6_4_19.doc (28 September 2000), clause 3.4
-
(1994)
-
-
-
86
-
-
48849104269
-
Data privacy and security are a significant part of the outsourcing equation
-
June
-
Jacqueline Klosek, Data Privacy and Security Are A Significant Part of The Outsourcing Equation, Intellectual Property & Technology Law Journal June, 2005
-
(2005)
Intellectual Property & Technology Law Journal
-
-
Klosek, J.1
|