- 1、本文档共8页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
InformatIon SecurIty BreacheS and the threat to conSumerS
InformatIon SecurIty BreacheS
and the threat to conSumerS
by
Fred H. Cate
September 2005
? 2005 The Center for Information Policy Leadership at Hunton Williams LLP.
The Center for Information Policy Leadership develops initiatives that encourage responsible informa-
tion governance in today’s digital society. The Center is a member-driven organization that operates
within the Privacy and Information Management practice at Hunton Williams LLP. Through col-
laboration with industry leaders, consumer organizations and government representatives, the Center
provides leadership in developing policy to help ensure privacy and information security while balancing
economic and societal needs and interests in today’s global information age. rmationpolicy-
.
2Summary
? Information security “breaches” take many forms and occur in a wide variety of settings.
However, contrary to recent press reports, they do not appear to be increasing.
? Research indicates that only a small percentage of breaches result in any harmful use of
data.
? Account fraud and true identity fraud — the two identity-based frauds most feared by con-
sumers and policy makers — are actually declining.
? The vulnerability of unsecured personal data and the threat of identity-based frauds neverthe-
less continue to grow and evolve as perpetrators become more sophisticated in how they
seek to obtain and exploit personal information.
? That threat, and particularly the risk of synthetic identity fraud, poses real dangers for indi-
viduals, institutions, and the information economy.
? Action to combat that threat must be thoughtful, well targeted, and forward-looking if it is to
guard against new risks and do so without compromising the information-based services that
the public increasingly enjoys and expects.
Introduction
The unprecedented number of disclosures about information security “breaches” during the first half of
2005 has brought into sharp focus the importance of securing personal i
您可能关注的文档
- GMAT语法题OG详解70-140-智课教育.pdf
- GMAT句子改错题如何记笔记-智课教育.pdf
- GMAT逻辑之逻辑图解题法-智课教育.pdf
- GMAT逻辑Weaken类题目解析之推论有缺陷-智课教育.pdf
- GMAT逻辑假设题解题思路-智课教育.pdf
- GMAT逻辑套路归纳-智课教育.pdf
- GMP,compliance audit,inspection.pdf
- GMAT阅读极端词汇错误实例讲解-智课教育.pdf
- GMP最前沿第五期-SM和WL.pdf
- go for it八年级unit 6学案及试卷(用于家教或者自学)自己精心整理的1.doc
- Inject ion of salt.pdf
- INET-D71-REV01-8188.pdf
- Insight into the Role of Instantons and their Zero Modes from Lattice QCD.pdf
- Innovative methodology for comprehensive utilization of iron ore tailings.pdf
- INFORMATION FROM EUROPEAN UNION INSTITUTIONS BODIES OFFICES AND AGENCIES.pdf
- Instant Consistency Checking for the UML.pdf
- Installation_Guide_IceMegaMenu.pdf
- insinkerator foodservice.pdf
- Instanton, Monopole Condensation and Confinement.pdf
- Instantons and Emergent AdS_3 x S^3 Geometry.pdf
最近下载
- 海康威视VisionMaster算法平台用户手册V2.2.pdf
- 石秀峰-数据治理-企业数字化转型必经之路-2022.3.19.pdf VIP
- 某大学综合体育馆项目可行性研究报告.doc VIP
- 幼儿园大班音乐《光脚的小约翰》活动课件.pptx
- 三校生计算机基础知识提纲及讲义资料.docx
- 三年级音乐学情及教材分析集合6篇 .pdf VIP
- 2024《小米公司手机品牌营销环境SWOT分析及营销策略》10000字.docx
- 九年级化学下册教学课件《跨学科实践活动9 探究土壤酸碱性对植物生长的影响》.pptx VIP
- 大疆 大疆智图 操作白皮书.pdf VIP
- 2025年贵州遵义市仁怀市申仁包装印务有限责任公司招聘笔试参考题库附带答案详解.pdf
文档评论(0)