Guide to Protecting the Confidentiality of Personally Identifiable Information

Guide to Protecting the Confidentiality of Personally Identifiable Information
Author: Erika McCallister
Publisher: DIANE Publishing
Total Pages: 59
Release: 2010-09
Genre: Computers
ISBN: 1437934889

The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.

Computers at Risk

Computers at Risk
Author: National Research Council
Publisher: National Academies Press
Total Pages: 320
Release: 1990-02-01
Genre: Computers
ISBN: 0309043883

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.

Minimum Security Requirements for Federal Information and Information Systems

Minimum Security Requirements for Federal Information and Information Systems
Author:
Publisher: DIANE Publishing
Total Pages: 17
Release: 2009-05
Genre: Computers
ISBN: 1437912702

The E-Government Act, passed by the 107th Congress and signed into law by the Pres. in Dec. 2002, recognized the importance of info. security to the economic and nat. security interests of the U.S. Title III of the Act, entitled the Fed. Info. Security Mgmt. Act (FISMA), emphasizes the need for each fed. agency to develop, document, and implement an enterprise-wide program to provide info. security for the info. systems that support the operations of the agency. FISMA directed the promulgation of fed. standards for: (1) the security categorization of fed. info. and info. systems based on the objectives of providing appropriate levels of info. security; and (2) minimum security requirements for info. and info. systems in each such category.

Code of Federal Regulations, Title 12, Banks and Banking, PT. 500-599, Revised as of January 1, 2012

Code of Federal Regulations, Title 12, Banks and Banking, PT. 500-599, Revised as of January 1, 2012
Author: U S Office of the Federal Register
Publisher: Government Printing Office
Total Pages: 620
Release: 2012-03
Genre: Law
ISBN: 9780160900884

The Code of Federal Regulations is a codification of the general and permanent rules published in the Federal Register by the Executive departments and agencies of the United States Federal Government. This volume contains the regulations for the Office of Thrift Supervision.

Code of Federal Regulations

Code of Federal Regulations
Author: United States. Internal Revenue Service
Publisher:
Total Pages: 1026
Release: 1994
Genre: Aeronautics
ISBN:

Special edition of the Federal register, containing a codification of documents of general applicability and future effect as of April 1 ... with ancillaries