Jump to ContentJump to Main Navigation

You are looking at 1-20 of 26 items

  • Keywords: data security x
Clear All Modify Search

View:

Privacy, Data Protection and Security in the Context of Direct-to-Consumer Genetic Testing Services

Andelka M Phillips

in Buying your Self on the Internet: Wrap Contracts and Personal Genomics

Published in print:
2019
Published Online:
May 2020
ISBN:
9781474422598
eISBN:
9781474476485
Item type:
chapter
Publisher:
Edinburgh University Press
DOI:
10.3366/edinburgh/9781474422598.003.0004
Subject:
Law, Legal Profession and Ethics

This chapter provides a broad overview of privacy, data protection and security issues raised by DTC services. This includes discussion of the EU’s General Data Protection Regulation (GDPR), the UK’s ... More


Confidentiality

M. J. Quinn

in Geographical and Environmental Epidemiology: Methods for Small Area Studies

Published in print:
1996
Published Online:
September 2009
ISBN:
9780192622358
eISBN:
9780191723636
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780192622358.003.0013
Subject:
Public Health and Epidemiology, Public Health, Epidemiology

This chapter discusses the issues of confidentiality and security. It describes the legal and other safeguards for individuals in the UK, outlines the procedures adopted by the Office of Population ... More


Reporting of Information Security Breaches: A Reporter's View: Corporate Information Security and the Impact of Data Breach Notification Laws

Kim Zetter

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0004
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter presents an insider's view of how information about corporate information security breaches reaches the public. It says that “[d]espite the passage of state-level data security breach ... More


The analysis database

Curtis L. Meinert and Susan Tonascia

in Clinical Trials: Design, Conduct and Analysis

Published in print:
1986
Published Online:
September 2009
ISBN:
9780195035681
eISBN:
9780199864478
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780195035681.003.0017
Subject:
Public Health and Epidemiology, Public Health, Epidemiology

This chapter discusses the issues involved in the development and maintenance of the analysis database. Topics covered include choice of computing facility, organization of programming resources, ... More


Information Security of Health Data: Electronic Health Information Security and Privacy

Sharona Hoffman and Andy Podgurski

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0007
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter analyzes electronic health data security vulnerabilities and the legal framework that has been established to address them. It describes the wide-ranging threats to health information ... More


Information Security, Law, and Data-Intensive Business Models: Data Control and Social Networking: Irreconcilable Ideas?

Lilian Edwards and Ian Brown

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0011
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter discusses the challenges to information security from social networking websites and the new business models they represent. The success of this new generation of data-intensive virtual ... More


Control, Security, and Risk in the Cloud

W Kuan Hon, Christopher Millard, and Jatinder Singh

in Cloud Computing Law

Published in print:
2021
Published Online:
June 2021
ISBN:
9780198716662
eISBN:
9780191918582
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198716662.003.0002
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter discusses the risks in cloud computing. Concerns are often raised about decreased customer control and increased provider control of data in clouds, particularly regarding data security ... More


Conclusion

Andrea M. Matwyshyn

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0012
Subject:
Law, Intellectual Property, IT, and Media Law

This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of ... More


What Risk Prevention Measures Can I Use?

Gregory Falco and Eric Rosenbach

in Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity

Published in print:
2022
Published Online:
November 2021
ISBN:
9780197526545
eISBN:
9780197526576
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780197526545.003.0006
Subject:
Business and Management, Information Technology

The question “What risk prevention measures can I use?” describes how to reduce the likelihood of a cyberattack on your organization. The chapter begins with a case study on the SolarWinds hack ... More


Information Security and Contracts: Contracting Insecurity: Software License Terms That Undermine Information Security

Jennifer A. Chandler

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0010
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter examines software contracting through the lens of cybersecurity in order to analyze terms and practices that arguably reduce the general level of cybersecurity. The inspiration for this ... More


Brain reading

John-Dylan Haynes

in I Know What You're Thinking: Brain imaging and mental privacy

Published in print:
2012
Published Online:
September 2012
ISBN:
9780199596492
eISBN:
9780191745669
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199596492.003.0003
Subject:
Neuroscience, Techniques, Development

For a long time neuroscience has focused on basic research, but now studies have begun to demonstrate how brain science can be put to use to solve practical real-world problems. Specifically, ... More


Benefit Plan Cybersecurity Considerations: A Recordkeeper and Plan Perspective

Timothy Rouse, David N. Levine, Allison Itami, and Benjamin Taylor

in The Disruptive Impact of FinTech on Retirement Systems

Published in print:
2019
Published Online:
October 2019
ISBN:
9780198845553
eISBN:
9780191880728
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198845553.003.0006
Subject:
Business and Management, Pensions and Pension Management, Innovation

The U.S. has no comprehensive national law governing cybersecurity and no uniform framework for measuring the effectiveness of protections, though retirement plan record keepers maintain the ... More


Core Principles of Data Privacy Law

Lee A. Bygrave

in Data Privacy Law: An International Perspective

Published in print:
2014
Published Online:
April 2014
ISBN:
9780199675555
eISBN:
9780191758904
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199675555.003.0005
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter discusses the basic principles of data privacy law. It presents the constituent elements of these principles, along with the similarities and differences in the way they are elaborated ... More


Communications Privacy

Ian Walden

in Telecommunications Law and Regulation

Published in print:
2018
Published Online:
March 2021
ISBN:
9780198807414
eISBN:
9780191927966
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198807414.003.0018
Subject:
Law, Intellectual Property, IT, and Media Law

The right to privacy of communications is one of the most enduring and widely recognized of the constellation of rights known as privacy law. While privacy remains a notoriously elusive concept, ... More


Cloud Computing, Standards, and the Law

Niamh Gleeson and Ian Walden

in Cloud Computing Law

Published in print:
2021
Published Online:
June 2021
ISBN:
9780198716662
eISBN:
9780191918582
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/oso/9780198716662.003.0015
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter focuses on EU initiatives on cloud standards, particularly the work of the European Telecommunications Standards Institute (ETSI), the European Union Agency for Network and Information ... More


The Internet as Psychological Laboratory Revisited: Best Practices, Challenges, and Solutions

Edward G. Sargis, Linda J. Skitka, and William McKeever

in The Social Net: Understanding our online behavior

Published in print:
2013
Published Online:
May 2013
ISBN:
9780199639540
eISBN:
9780191747748
Item type:
chapter
Publisher:
Oxford University Press
DOI:
10.1093/acprof:oso/9780199639540.003.0013
Subject:
Psychology, Cognitive Psychology, Social Psychology

This chapter tackles the topic of online research. It argues that social psychologists increasingly use the Internet to facilitate their studies and goes on to examine the prevalence of ... More


Epilogue

Anindya Ghose

in Tap: Unlocking the Mobile Economy

Published in print:
2017
Published Online:
January 2018
ISBN:
9780262036276
eISBN:
9780262340427
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262036276.003.0016
Subject:
Business and Management, Marketing

This epilogue presents a few closing thoughts about the impact of mobile technology on society at large. It argues that the future of mobile advertising depends on a bargain that consumers and firms ... More


Setting the Stage: The Past and Present of Human Subjects Research Regulations

Amy L. Davis and Elisa A. Hurley

in Human Subjects Research Regulation: Perspectives on the Future

Published in print:
2014
Published Online:
January 2015
ISBN:
9780262027465
eISBN:
9780262320825
Item type:
chapter
Publisher:
The MIT Press
DOI:
10.7551/mitpress/9780262027465.003.0002
Subject:
Biology, Bioethics

This chapter provides a summary of the major regulatory changes to the Common Rule proposed in the June 2011 Advance Notice of Proposed Rulemaking (ANPRM), places those changes in historical context, ... More


Factors Influencing Identifying Only as Taiwanese: A Layered Empirical Approach (Survey II)

Scott Sigmund Gartner, Chin-Hao Huang, Yitan Li, and Patrick James

in Identity in the Shadow of a Giant: How the Rise of China is Changing Taiwan

Published in print:
2021
Published Online:
January 2022
ISBN:
9781529209877
eISBN:
9781529209914
Item type:
chapter
Publisher:
Policy Press
DOI:
10.1332/policypress/9781529209877.003.0007
Subject:
Political Science, Asian Politics

This chapter carries out a layered empirical approach from survey results obtained in 2017 to describe how people in Taiwan increasingly view their identity as separate and different from that of the ... More


Looking at Information Security Through an Interdisciplinary Lens: Computer Science as a Social Science: Applications to Computer Security

Jonathan Pincus, Sarah Blankinship, and Tomasz Ostwald

in Harboring Data: Information Security, Law, and the Corporation

Published in print:
2009
Published Online:
June 2013
ISBN:
9780804760089
eISBN:
9780804772594
Item type:
chapter
Publisher:
Stanford University Press
DOI:
10.11126/stanford/9780804760089.003.0002
Subject:
Law, Intellectual Property, IT, and Media Law

This chapter argues for a multidisciplinary perspective in analyzing information security. Developing the best information security practices requires broadening the scope of current perspectives on ... More


View: