-
1
-
-
77955684707
-
Database security breach notification statutes: Does placing the responsibility on the true victim increase data security?
-
L. Rode, "Database Security Breach Notification Statutes: Does Placing the Responsibility on the True Victim Increase Data Security?," Houston Law Review, vol.43, p. 1597, 2007.
-
(2007)
Houston Law Review
, vol.43
, pp. 1597
-
-
Rode, L.1
-
2
-
-
77955705182
-
California's database breach notification security act: The first state breach notification law is not yet a suitable template for national identity theft legislation
-
T. H. Skinner, "California's Database Breach Notification Security Act: The First State Breach Notification Law is Not Yet a Suitable Template for National Identity Theft Legislation," Richmond Journal of Law & Technology, vol.10, 2003.
-
(2003)
Richmond Journal of Law & Technology
, vol.10
-
-
Skinner, T.H.1
-
3
-
-
77955680032
-
The new law of information security: What companies need to do now
-
Nov 2005
-
T. J. Smedinghoff, "The New Law of Information Security: What Companies Need to Do Now," Computer and Internet Lawyer, vol.22, p. 9, Nov 2005 2005.
-
(2005)
Computer and Internet Lawyer
, vol.22
, pp. 9
-
-
Smedinghoff, T.J.1
-
4
-
-
33947536241
-
Notification of data security breaches
-
P. M. Schwartz and E. J. Janger, "Notification of Data Security Breaches," Michigan Law Review, vol.105, pp. 913-984, 2007.
-
(2007)
Michigan Law Review
, vol.105
, pp. 913-984
-
-
Schwartz, P.M.1
Janger, E.J.2
-
5
-
-
33845572567
-
-
Privacy Rights Clearinghouse, (21 March). Available
-
Privacy Rights Clearinghouse. (2009, 21 March). A Chronology of Data Breaches. Available: http://www.privacyrights.org/ar/ChronDataBreaches.htm#CP.
-
(2009)
A Chronology of Data Breaches
-
-
-
7
-
-
77955668316
-
Data protection, breach notification, and the interplay between state and federal law: The experiments need more time
-
F. J. Garcia, "Data Protection, Breach Notification, and the Interplay between State and Federal Law: The Experiments Need More Time," Fordham Intellectual Property, Media & Entertainment Law Journal, vol.17, pp. 693-727, 2007.
-
(2007)
Fordham Intellectual Property, Media & Entertainment Law Journal
, vol.17
, pp. 693-727
-
-
Garcia, F.J.1
-
8
-
-
34547746721
-
Misplaced role of identity theft in triggering public notice of database breaches
-
B. St. Amant, "Misplaced Role of Identity Theft in Triggering Public Notice of Database Breaches," Harvard Journal on Legislation, vol.44, pp. 505- 528, 2007.
-
(2007)
Harvard Journal on Legislation
, vol.44
, pp. 505-528
-
-
St. Amant, B.1
-
9
-
-
33751578879
-
Protecting information security under a uniform data breach notification law
-
K. E. Picanso, "Protecting Information Security Under a Uniform Data Breach Notification Law," Fordham Law Review, vol.75, pp. 355-390, 2006.
-
(2006)
Fordham Law Review
, vol.75
, pp. 355-390
-
-
Picanso, K.E.1
-
10
-
-
77957932720
-
Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs
-
S. Lee, "Breach notification laws: Notification requirements and data safeguarding now apply to everyone, including entrepreneurs," Entrepreneurial Business Law Journal, vol.1, pp. 125-, 2006.
-
(2006)
Entrepreneurial Business Law Journal
, vol.1
, pp. 125
-
-
Lee, S.1
-
14
-
-
77955685549
-
-
Open Security Foundation, (19 August). Available
-
Open Security Foundation. (2009, 19 August). Dataloss Statistics. Available: http://datalossdb.org/statistics.
-
(2009)
Dataloss Statistics
-
-
-
15
-
-
77955698606
-
-
D.C. CODE ANN. § 28-3851 (2007)
-
D.C. CODE ANN. § 28-3851 (2007).
-
-
-
-
16
-
-
77955674318
-
-
WYO. STAT. ANN. §§ 40-12-501 (Michie 2007)
-
WYO. STAT. ANN. §§ 40-12-501 (Michie 2007).
-
-
-
-
17
-
-
77955702178
-
-
CAL. CIV. CODE (West 2003)
-
CAL. CIV. CODE (West 2003).
-
-
-
-
18
-
-
77955688223
-
-
COLO. REV. STAT. § 6-1-716
-
COLO. REV. STAT. § 6-1-716.
-
-
-
-
19
-
-
77955697946
-
-
ALASKA STAT. § 45.48.010 (Michie 2009)
-
ALASKA STAT. § 45.48.010 (Michie 2009).
-
-
-
-
20
-
-
77955686850
-
-
CONN. GEN. STAT. § 36a-701b (2006)
-
CONN. GEN. STAT. § 36a-701b (2006).
-
-
-
-
21
-
-
77955674755
-
-
MINN. STAT. § 325E.61 (2006)
-
MINN. STAT. § 325E.61 (2006).
-
-
-
-
22
-
-
77955677562
-
-
S.C. CODE ANN. § 39-1-90 (Law Co-op 2009)
-
S.C. CODE ANN. § 39-1-90 (Law Co-op 2009).
-
-
-
-
23
-
-
77955671083
-
-
UTAH CODE ANN. §§ 13-42-101 (2006)
-
UTAH CODE ANN. §§ 13-42-101 (2006).
-
-
-
-
24
-
-
77955682887
-
-
N.C. GEN. STAT. §§ 75-160 (2005)
-
N.C. GEN. STAT. §§ 75-160 (2005).
-
-
-
-
25
-
-
77955704144
-
-
IOWA CODE § 715C.1 (2008)
-
IOWA CODE § 715C.1 (2008).
-
-
-
-
26
-
-
77955677132
-
-
OR. REV. STAT. § 646A.600 (2007)
-
OR. REV. STAT. § 646A.600 (2007).
-
-
-
-
27
-
-
77955701961
-
-
OHIO REV. CODE ANN. § 1349.19 (West 2005)
-
OHIO REV. CODE ANN. § 1349.19 (West 2005).
-
-
-
-
28
-
-
77955676253
-
-
IND. CODE §§ 24-4.9-3-11 (2006)
-
IND. CODE §§ 24-4.9-3-11 (2006).
-
-
-
-
29
-
-
77955691739
-
-
N.H. REV. STAT. ANN. §§ 359-C:19 (2007)
-
N.H. REV. STAT. ANN. §§ 359-C:19 (2007).
-
-
-
-
30
-
-
77955670608
-
-
MASS. GEN. LAWS 93H §1 (2007)
-
MASS. GEN. LAWS 93H §1 (2007).
-
-
-
-
31
-
-
77955679378
-
-
ME. REV. STAT. ANN. 10, §§ 210-B-1346 (West 2007)
-
ME. REV. STAT. ANN. 10, §§ 210-B-1346 (West 2007).
-
-
-
-
33
-
-
77955680908
-
-
(6 October). Available
-
I. Linden. (2006, 6 October). Security Breach Update. Available: https://blogs.secondlife.com/community/feature s/blog/2006/09/22/security- breach-update.
-
(2006)
Security Breach Update
-
-
Linden, I.1
-
34
-
-
84867304496
-
-
(6 October). Available
-
J. Lo and Office of the Privacy Commissioner Canada. (2008, 6 October). Second Life: Privacy in Virtual Worlds. Available: http://www.priv.gc.ca/ information/pub/sl-080411-e.cfm#sec3371.
-
(2008)
Second Life: Privacy in Virtual Worlds
-
-
Lo, J.1
-
35
-
-
77955678509
-
-
Open Security Foundation, (19 August). Available
-
Open Security Foundation. (2009, 19 August). Dataloss DB. Available: http://datalossdb.org/about.
-
(2009)
Dataloss DB
-
-
-
36
-
-
77955670860
-
-
Open Security Foundation, (19 August). Available
-
Open Security Foundation. (2009, 19 August). Primary Sources: Voxant Data Breach. Available: http://datalossdb.org/primary-sources/1220.
-
(2009)
Primary Sources: Voxant Data Breach
-
-
-
39
-
-
77955708039
-
Analyzing the TJ maxx data security fiasco: Lessons for auditors
-
G. Berg, et al., "Analyzing the TJ Maxx Data Security Fiasco: Lessons for Auditors," The CPA Journal, vol.78, p. 34, 2008.
-
(2008)
The CPA Journal
, vol.78
, pp. 34
-
-
Berg, G.1
-
40
-
-
70450256774
-
Breaking the code: How credit-card data went out wireless door --- in biggest known theft, retailer's weak security lost millions of numbers
-
ed. New York: Dow Jones & Company
-
J. Pereira, "Breaking The Code: How Credit-Card Data Went Out Wireless Door --- In Biggest Known Theft, Retailer's Weak Security Lost Millions of Numbers," in The Wall Street Journal, ed. New York: Dow Jones & Company, 2007, p. A1.
-
(2007)
The Wall Street Journal
-
-
Pereira, J.1
-
41
-
-
77955680693
-
TJX reaches $40m settlement with visa over data breach
-
ed
-
R. Kerber, "TJX Reaches $40m settlement with Visa Over Data Breach," in Boston Globe, ed, 2007.
-
(2007)
Boston Globe
-
-
Kerber, R.1
-
42
-
-
77955668545
-
-
(12 October), Available
-
A. Gonsalves. (2009, 12 October). Hacker Pleads Guilty In Major Identify Theft Available: http://www.informationweek.com/news/security/ intrusionprevention/showArticle.jhtml?articleID=220000036.
-
(2009)
Hacker Pleads Guilty in Major Identify Theft
-
-
Gonsalves, A.1
-
43
-
-
77955679588
-
Are 'better' security breach notification laws possible?
-
2009
-
J. Winn, "Are 'Better' Security Breach Notification Laws Possible?," Berkeley Technology Law Journal, Vol.24, 2009, 2009.
-
(2009)
Berkeley Technology Law Journal
, vol.24
-
-
Winn, J.1
-
44
-
-
77955704381
-
The developing U.S. legal standard for cybersecurity
-
Fall
-
T. J. Smedinghoff, "The Developing U.S. legal Standard for Cybersecurity," Sedona Conference Journal, vol.4, pp. 109-120, Fall 2003.
-
(2003)
Sedona Conference Journal
, vol.4
, pp. 109-120
-
-
Smedinghoff, T.J.1
|