메뉴 건너뛰기




Volumn , Issue , 2010, Pages 96-102

If it's encrypted its secure! the viability of US state-based encryption exemptions

Author keywords

[No Author keywords available]

Indexed keywords

AUSTRALIAN LAW REFORM COMMISSION; DATA BREACHES; GOVERNMENT FAILURES; PERSONAL INFORMATION; POTENTIAL CAPABILITY; STATE LEGISLATURES; STATE-BASED;

EID: 77955686873     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISTAS.2010.5514647     Document Type: Conference Paper
Times cited : (2)

References (46)
  • 1
    • 77955684707 scopus 로고    scopus 로고
    • Database security breach notification statutes: Does placing the responsibility on the true victim increase data security?
    • L. Rode, "Database Security Breach Notification Statutes: Does Placing the Responsibility on the True Victim Increase Data Security?," Houston Law Review, vol.43, p. 1597, 2007.
    • (2007) Houston Law Review , vol.43 , pp. 1597
    • Rode, L.1
  • 2
    • 77955705182 scopus 로고    scopus 로고
    • California's database breach notification security act: The first state breach notification law is not yet a suitable template for national identity theft legislation
    • T. H. Skinner, "California's Database Breach Notification Security Act: The First State Breach Notification Law is Not Yet a Suitable Template for National Identity Theft Legislation," Richmond Journal of Law & Technology, vol.10, 2003.
    • (2003) Richmond Journal of Law & Technology , vol.10
    • Skinner, T.H.1
  • 3
    • 77955680032 scopus 로고    scopus 로고
    • The new law of information security: What companies need to do now
    • Nov 2005
    • T. J. Smedinghoff, "The New Law of Information Security: What Companies Need to Do Now," Computer and Internet Lawyer, vol.22, p. 9, Nov 2005 2005.
    • (2005) Computer and Internet Lawyer , vol.22 , pp. 9
    • Smedinghoff, T.J.1
  • 4
    • 33947536241 scopus 로고    scopus 로고
    • Notification of data security breaches
    • P. M. Schwartz and E. J. Janger, "Notification of Data Security Breaches," Michigan Law Review, vol.105, pp. 913-984, 2007.
    • (2007) Michigan Law Review , vol.105 , pp. 913-984
    • Schwartz, P.M.1    Janger, E.J.2
  • 5
    • 33845572567 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse, (21 March). Available
    • Privacy Rights Clearinghouse. (2009, 21 March). A Chronology of Data Breaches. Available: http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP.
    • (2009) A Chronology of Data Breaches
  • 7
    • 77955668316 scopus 로고    scopus 로고
    • Data protection, breach notification, and the interplay between state and federal law: The experiments need more time
    • F. J. Garcia, "Data Protection, Breach Notification, and the Interplay between State and Federal Law: The Experiments Need More Time," Fordham Intellectual Property, Media & Entertainment Law Journal, vol.17, pp. 693-727, 2007.
    • (2007) Fordham Intellectual Property, Media & Entertainment Law Journal , vol.17 , pp. 693-727
    • Garcia, F.J.1
  • 8
    • 34547746721 scopus 로고    scopus 로고
    • Misplaced role of identity theft in triggering public notice of database breaches
    • B. St. Amant, "Misplaced Role of Identity Theft in Triggering Public Notice of Database Breaches," Harvard Journal on Legislation, vol.44, pp. 505- 528, 2007.
    • (2007) Harvard Journal on Legislation , vol.44 , pp. 505-528
    • St. Amant, B.1
  • 9
    • 33751578879 scopus 로고    scopus 로고
    • Protecting information security under a uniform data breach notification law
    • K. E. Picanso, "Protecting Information Security Under a Uniform Data Breach Notification Law," Fordham Law Review, vol.75, pp. 355-390, 2006.
    • (2006) Fordham Law Review , vol.75 , pp. 355-390
    • Picanso, K.E.1
  • 10
    • 77957932720 scopus 로고    scopus 로고
    • Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs
    • S. Lee, "Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs," Entrepreneurial Business Law Journal, vol.1, pp. 125-, 2006.
    • (2006) Entrepreneurial Business Law Journal , vol.1 , pp. 125
    • Lee, S.1
  • 14
    • 77955685549 scopus 로고    scopus 로고
    • Open Security Foundation, (19 August). Available
    • Open Security Foundation. (2009, 19 August). Dataloss Statistics. Available: http://datalossdb.org/statistics.
    • (2009) Dataloss Statistics
  • 15
    • 77955698606 scopus 로고    scopus 로고
    • D.C. CODE ANN. § 28-3851 (2007)
    • D.C. CODE ANN. § 28-3851 (2007).
  • 16
    • 77955674318 scopus 로고    scopus 로고
    • WYO. STAT. ANN. §§ 40-12-501 (Michie 2007)
    • WYO. STAT. ANN. §§ 40-12-501 (Michie 2007).
  • 17
    • 77955702178 scopus 로고    scopus 로고
    • CAL. CIV. CODE (West 2003)
    • CAL. CIV. CODE (West 2003).
  • 18
    • 77955688223 scopus 로고    scopus 로고
    • COLO. REV. STAT. § 6-1-716
    • COLO. REV. STAT. § 6-1-716.
  • 19
    • 77955697946 scopus 로고    scopus 로고
    • ALASKA STAT. § 45.48.010 (Michie 2009)
    • ALASKA STAT. § 45.48.010 (Michie 2009).
  • 20
    • 77955686850 scopus 로고    scopus 로고
    • CONN. GEN. STAT. § 36a-701b (2006)
    • CONN. GEN. STAT. § 36a-701b (2006).
  • 21
    • 77955674755 scopus 로고    scopus 로고
    • MINN. STAT. § 325E.61 (2006)
    • MINN. STAT. § 325E.61 (2006).
  • 22
    • 77955677562 scopus 로고    scopus 로고
    • S.C. CODE ANN. § 39-1-90 (Law Co-op 2009)
    • S.C. CODE ANN. § 39-1-90 (Law Co-op 2009).
  • 23
    • 77955671083 scopus 로고    scopus 로고
    • UTAH CODE ANN. §§ 13-42-101 (2006)
    • UTAH CODE ANN. §§ 13-42-101 (2006).
  • 24
    • 77955682887 scopus 로고    scopus 로고
    • N.C. GEN. STAT. §§ 75-160 (2005)
    • N.C. GEN. STAT. §§ 75-160 (2005).
  • 25
    • 77955704144 scopus 로고    scopus 로고
    • IOWA CODE § 715C.1 (2008)
    • IOWA CODE § 715C.1 (2008).
  • 26
    • 77955677132 scopus 로고    scopus 로고
    • OR. REV. STAT. § 646A.600 (2007)
    • OR. REV. STAT. § 646A.600 (2007).
  • 27
    • 77955701961 scopus 로고    scopus 로고
    • OHIO REV. CODE ANN. § 1349.19 (West 2005)
    • OHIO REV. CODE ANN. § 1349.19 (West 2005).
  • 28
    • 77955676253 scopus 로고    scopus 로고
    • IND. CODE §§ 24-4.9-3-11 (2006)
    • IND. CODE §§ 24-4.9-3-11 (2006).
  • 29
    • 77955691739 scopus 로고    scopus 로고
    • N.H. REV. STAT. ANN. §§ 359-C:19 (2007)
    • N.H. REV. STAT. ANN. §§ 359-C:19 (2007).
  • 30
    • 77955670608 scopus 로고    scopus 로고
    • MASS. GEN. LAWS 93H §1 (2007)
    • MASS. GEN. LAWS 93H §1 (2007).
  • 31
    • 77955679378 scopus 로고    scopus 로고
    • ME. REV. STAT. ANN. 10, §§ 210-B-1346 (West 2007)
    • ME. REV. STAT. ANN. 10, §§ 210-B-1346 (West 2007).
  • 33
    • 77955680908 scopus 로고    scopus 로고
    • (6 October). Available
    • I. Linden. (2006, 6 October). Security Breach Update. Available: https://blogs.secondlife.com/community/feature s/blog/2006/09/22/security- breach-update.
    • (2006) Security Breach Update
    • Linden, I.1
  • 34
    • 84867304496 scopus 로고    scopus 로고
    • (6 October). Available
    • J. Lo and Office of the Privacy Commissioner Canada. (2008, 6 October). Second Life: Privacy in Virtual Worlds. Available: http://www.priv.gc.ca/ information/pub/sl-080411-e.cfm#sec3371.
    • (2008) Second Life: Privacy in Virtual Worlds
    • Lo, J.1
  • 35
    • 77955678509 scopus 로고    scopus 로고
    • Open Security Foundation, (19 August). Available
    • Open Security Foundation. (2009, 19 August). Dataloss DB. Available: http://datalossdb.org/about.
    • (2009) Dataloss DB
  • 36
    • 77955670860 scopus 로고    scopus 로고
    • Open Security Foundation, (19 August). Available
    • Open Security Foundation. (2009, 19 August). Primary Sources: Voxant Data Breach. Available: http://datalossdb.org/primary-sources/1220.
    • (2009) Primary Sources: Voxant Data Breach
  • 39
    • 77955708039 scopus 로고    scopus 로고
    • Analyzing the TJ maxx data security fiasco: Lessons for auditors
    • G. Berg, et al., "Analyzing the TJ Maxx Data Security Fiasco: Lessons for Auditors," The CPA Journal, vol.78, p. 34, 2008.
    • (2008) The CPA Journal , vol.78 , pp. 34
    • Berg, G.1
  • 40
    • 70450256774 scopus 로고    scopus 로고
    • Breaking the code: How credit-card data went out wireless door --- in biggest known theft, retailer's weak security lost millions of numbers
    • ed. New York: Dow Jones & Company
    • J. Pereira, "Breaking The Code: How Credit-Card Data Went Out Wireless Door --- In Biggest Known Theft, Retailer's Weak Security Lost Millions of Numbers," in The Wall Street Journal, ed. New York: Dow Jones & Company, 2007, p. A1.
    • (2007) The Wall Street Journal
    • Pereira, J.1
  • 41
    • 77955680693 scopus 로고    scopus 로고
    • TJX reaches $40m settlement with visa over data breach
    • ed
    • R. Kerber, "TJX Reaches $40m settlement with Visa Over Data Breach," in Boston Globe, ed, 2007.
    • (2007) Boston Globe
    • Kerber, R.1
  • 42
    • 77955668545 scopus 로고    scopus 로고
    • (12 October), Available
    • A. Gonsalves. (2009, 12 October). Hacker Pleads Guilty In Major Identify Theft Available: http://www.informationweek.com/news/security/ intrusionprevention/showArticle.jhtml?articleID=220000036.
    • (2009) Hacker Pleads Guilty in Major Identify Theft
    • Gonsalves, A.1
  • 43
    • 77955679588 scopus 로고    scopus 로고
    • Are 'better' security breach notification laws possible?
    • 2009
    • J. Winn, "Are 'Better' Security Breach Notification Laws Possible?," Berkeley Technology Law Journal, Vol.24, 2009, 2009.
    • (2009) Berkeley Technology Law Journal , vol.24
    • Winn, J.1
  • 44
    • 77955704381 scopus 로고    scopus 로고
    • The developing U.S. legal standard for cybersecurity
    • Fall
    • T. J. Smedinghoff, "The Developing U.S. legal Standard for Cybersecurity," Sedona Conference Journal, vol.4, pp. 109-120, Fall 2003.
    • (2003) Sedona Conference Journal , vol.4 , pp. 109-120
    • Smedinghoff, T.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.