MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Inc.
April 2007
Dan Briody
Online Indemnity No two insurance policies are the same, but cyber insurance policies generally include coverage for the incidents listed in this article. mark for My Articles similar articles
Commercial Investment Real Estate
Sep/Oct 2015
Alan Lyons
Cyber Scares Protect your real estate business from online security breaches. mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Prasad Balakrishnan
Cyber Attacks Can Come in Many Shapes and Sizes Cyber threats aimed at insurance companies are constantly evolving and growing. Unfortunately the pace of adoption of cyber protection mechanisms has not caught up. mark for My Articles similar articles
Managed Care
November 2006
Ed Silverman
Loss of Protected Patient Information Real Danger for Health Care Plans There are plenty of ways that confidential data can escape managed care organizations, and the consequences can be major. Can you trust your employees? mark for My Articles similar articles
Insurance & Technology
November 5, 2008
Peggy Bresnick Kendler
Virtual Roundtable: Online Risk Industry experts discuss how to manage the risks, liabilities, and solutions associated with electronic processes and interactions related to conducting business over the Internet. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
Wall Street & Technology
October 23, 2007
Melanie Rodier
How Are U.S. Businesses and Lawmakers Responding to Data Breaches? Nearly 77 million individuals have been affected by data breaches so far this year. But even after suffering a data breach, many businesses failed to implement encryption solutions or seek legal counsel. mark for My Articles similar articles
Inc.
April 2007
Dan Briody
Full Coverage How to hedge your cyber risk with insurance. mark for My Articles similar articles
CIO
April 15, 2002
Daintry Duffy
Continental Divide While Europe has adopted strict privacy regulations, U.S. companies are still collecting and trading their customers' info like it's going out of style. If Simon Davies has his way, it will... mark for My Articles similar articles
CIO
July 29, 2015
Heidi Shey
Data privacy is now a competitive differentiator How you handle confidential data may spell the difference between consumer loyalty and business disaster. mark for My Articles similar articles
CIO
November 1, 2001
Alison Bass
Miller's Privacy Warning Information security lapses present one front of a looming courtroom battle. Legal Expert Arthur Miller says CIOs and corporate America also have to protect people's privacy -- or risk a jury's wrath... mark for My Articles similar articles
National Defense
January 2016
Stephanie Meloni
Defense Department Assuming Growing Cyber Security Role The Defense Department sees cyber as a domain that spans air, land, sea and space, but it struggles with how to handle it as a war fighting domain to best protect the nation. mark for My Articles similar articles
InternetNews
July 28, 2010
Most Data Breaches Perpetrated by Cyber Gangs Organized crime syndicates, many of them based or operated from outside the U.S., are overwhelmingly to blame for coordinated cyber attacks, according to a study by Verizon and the U.S. Secret Service. mark for My Articles similar articles
InternetNews
December 17, 2010
Commerce Report Outlines Web Privacy Overhaul Long-anticipated report from Department of Commerce envisions a privacy bill of rights, calls for overhauls of data breach, electronic communications laws. mark for My Articles similar articles
InternetNews
February 6, 2007
Roy Mark
Concealment a Crime in Latest Data Breach Bill Additional legislation calls for criminal penalties for concealing breaches and consumer notification of 'significant' breaches. mark for My Articles similar articles
InternetNews
July 10, 2007
Roy Mark
Many Breaches, Few ID Thefts Data breaches are frequent, but evidence of actual identity theft resulting from the breaches is limited, according to a new report by the General Accountability Office. mark for My Articles similar articles
Information Today
May 3, 2012
Paula J. Hane
Online Consumer Privacy in the Spotlight Choose Privacy Week is being held May 1-7, 2012. The theme is "Freedom from Surveillance." The American Library Association's Office for Intellectual Freedom established Choose Privacy Week to deepen public awareness about this issue. The event is timely with many privacy issues like CISPA in the news. mark for My Articles similar articles
InternetNews
February 10, 2006
Roy Mark
DoJ Wants Cyber Crime Stats The Department of Justice is launching its first national survey to measure the prevalence and impact of cyber crime on U.S. businesses. mark for My Articles similar articles
Information Today
August 6, 2012
Barbie E. Keiser
Cybersecurity and Privacy Concerns at the Highest Levels of Government Ensuring the privacy and security of personal information collected by federal government agencies and preventing cyberattacks in the future is a responsibility of government that all Americans can support. mark for My Articles similar articles
PC Magazine
July 11, 2007
Cyrus Farivar
Closing the Loopholes on Data Theft Millions have had personal data, including credit card numbers, stolen this year. Congress is seeking to pass a stricter, nationwide law. mark for My Articles similar articles
InternetNews
January 28, 2004
Ryan Naraine
Gov't Rolls Out Cyber Alert System The federal government's cyber-security division unveils a new unit to serve as a clearinghouse of data on malicious hacking and virus threats against computer systems. mark for My Articles similar articles
CIO
June 9, 2009
Maryfran Johnson
Cybersecurity and the Privacy Debate How privacy issues are being addressed with cybersecurity. mark for My Articles similar articles
InternetNews
April 23, 2007
Roy Mark
A New Fight Against ID Theft Improved cyber security, increased law enforcement and public education top the recommendations of President Bush's Identity Theft Task Force plan issued today. mark for My Articles similar articles
Bank Technology News
November 2001
David Rountree
Taking Care of Customer Data A privacy breach in the banking industry may carry ominous legal ramifications, but they pale in comparison to the effects of a blown reputation... mark for My Articles similar articles
National Defense
March 2015
Sarah Sicard
North Korean Cyber Attack on Sony Poses Tough Security Questions While cyber attacks are on the rise around the world -- both from inside and outside threats -- this was the first known instance of a country deliberately causing destruction to a U.S. company's data. mark for My Articles similar articles
Wall Street & Technology
March 2, 2004
Brendon Lynch
Web-Privacy Management Increases in Importance An organization's reputation is increasingly at risk online. Financial-services firms, in particular, are constantly updating their Web sites to provide readily accessible information, services and products to their customers and provide a high degree of visibility for the company and its brands.. mark for My Articles similar articles
New Architect
May 2002
Kevin Savetz
Data Insurance Cover your most valuable assets -- the intangible ones... mark for My Articles similar articles
Bank Technology News
May 2007
Rebecca Sausner
Cyber Security: Data Breach Insurance Gains in Popularity As data breaches become more frequent, insurance policies offer a range of protections. But should money spent on premiums be spent on shoring up security instead? mark for My Articles similar articles
PC Magazine
July 13, 2004
Alan Cohen
No Where To Hide The average American is listed in at least 50 databases, and that's not counting government files. Do you know what's in your cyber dossier? mark for My Articles similar articles
Information Today
October 20, 2015
Barbie E. Keiser
The Federal Government Turns To Silicon Valley for Tech Support What's needed is input from these experts, but more importantly, a new viewpoint from a young demographic that works in new ways. mark for My Articles similar articles
Information Today
December 20, 2010
Commerce Department Calls for 'Privacy Bill of Rights' The report outlines a dynamic framework to increase protection of consumers' commercial data and support innovation and evolving technology. The Department is seeking additional public comment on the plan. mark for My Articles similar articles
InternetNews
May 17, 2005
Roy Mark
Swindle: 'Somebody Has Got to Pay' The Federal Trade Commission says corporate boards haven't been paying enough attention to data protection. mark for My Articles similar articles
The Motley Fool
February 5, 2007
Dan Caplinger
Insuring Your Small Business Once you've created a successful small business, you'll want to ensure that your business is protected from various kinds of risk. One way is to buy a business insurance policy. mark for My Articles similar articles
InternetNews
February 2, 2007
Roy Mark
Congress, White House Dinged on Cyber Security Lawmakers' inability to pass legislation and the administration's lack of leadership earn D's in annual report card from CSIA. mark for My Articles similar articles
InternetNews
July 14, 2005
Roy Mark
Cyber Security Gets Limelight in DHS Reorg Chertoff's organizational changes call for new cyber security position and increased information sharing. mark for My Articles similar articles
CIO
March 15, 2001
Policing Privacy Find the answers to all your Internet privacy law questions: Web hosts and COPPA... Privacy issues while trying to track down hackers... Monitoring employee Internet use in Canada... Privacy laws by country... mark for My Articles similar articles
Insurance & Technology
August 12, 2005
Gregg Keizer
ID Theft in Regulatory Spotlight The growing online menace of identity and data theft has resulted in the introduction of another bill to address the problem. The Identify Theft Protection Act is the 10th identity theft bill put into play this session. mark for My Articles similar articles
InternetNews
June 30, 2009
Kenneth Corbin
Gartner: Firms Still Playing Catch-Up With Privacy Budget shortfalls, tangled international laws stymie enterprise privacy operations. mark for My Articles similar articles
Bank Technology News
April 2007
Holly Sraeel
In the U.S., Privacy Isn't Always Convenient, Or Wanted While banks nationwide wrestle to comply with state privacy and breach notification laws, the TJX phenomenon brings the issue of consumer privacy into sharper focus: If Americans are inconvenienced in any way, they'll forgo privacy. mark for My Articles similar articles
U.S. Banker
June 2007
Rebecca Sausner
Cyber Security: Insurance Not Standard Yet, But Choices Abound Typical policies now offer a range of protections, as data breaches become more problematic. But at what point should premiums be spent instead on shoring up security? mark for My Articles similar articles
CIO
June 1, 2002
Ken Segarnick
Courts Say It's OK: Peep Away Readers' questions about the legal consequences of electronic monitoring: What rights, if any, does an employee have in protecting his privacy in the workplace?... Can the company access my personal AOL account?... etc. mark for My Articles similar articles
InternetNews
January 12, 2006
Roy Mark
Data Breaches: New Year, Old Story Data breaches are off to a flying start this year. Congress does nothing about it, not even requiring companies to inform consumers of the breaches. mark for My Articles similar articles
CIO
August 27, 2010
Kim S. Nash
Richard Clarke: Your Company Is a Front in a Future Cyberwar Former White House cybersecurity adviser Richard Clarke thinks the government should do more to defend companies against cyber-threats. mark for My Articles similar articles
InternetNews
February 17, 2005
Michael Singer
Cyber Security Heads Grade The System Security groups recommend a more robust partnership between the public and private sectors to protect against cyberspace attacks and physical attacks. mark for My Articles similar articles
National Defense
January 2016
Allyson Versprille
Fragmented Cyber Legislation Hinders Military The patchwork of legislation that allows the U.S. military and government to perform cyber operations is too disjointed to enable an effective and swift response, a former Army officer said. mark for My Articles similar articles
InternetNews
August 4, 2006
Roy Mark
Data Breaches And Congress A roundup of where federal data breach security laws stand. mark for My Articles similar articles
InternetNews
December 22, 2006
Ray Everett-Church
Privacy Rules: Business vs. Consumers American businesses lobbying for lax security regulations should look at Europe's example to see the economic value of tighter rules. mark for My Articles similar articles
InternetNews
June 8, 2010
HP System to Help Air Force Fight Cyber Threats HP's won a contract for a Cyber Control System that will help the Air Force gather strategic information and identify cyber threats. mark for My Articles similar articles
Commercial Investment Real Estate
Jul/Aug 2015
Mary Stark-Hood
Property Casualty Insurance As a business owner, you know the importance of protecting your real estate business from financial loss. Some risks may be acceptable, but many are not. mark for My Articles similar articles
PC World
April 25, 2008
Erik Larkin, PC World
Should You Trust Your Health Records to Google and Microsoft? Until we have laws guaranteeing the privacy of my digitized health information, I'll pass. mark for My Articles similar articles