text
stringlengths 0
118
|
---|
Netflix, 19 |
NHS (National Health Service) data breach, 71β72 |
NIST (National Institute of Standards and Technology) 800-53, 51, 161 |
NSA (National Security Agency), 103 |
Obama, Barack, 100, 151, 152 |
Oberdorf v. Amazon, 92 |
OβConnor, Nuala, 130 |
OECD Privacy Guidelines, 136 |
Office of Personnel Management data breach. See OPM data breach |
OIG (Inspector General Office), 129β30 |
Olstead, Renee, 166 |
1Password password manager, 183β84 |
Online Trust Alliance (OTA), 29, 34 |
OPM (Office of Personnel Management) data breach, 128β31 |
Central Personnel Data File, 129 |
CyTech Services and, 128β29 |
e-QIP system, 129 |
fingerprint data, 129 |
Inspector General Office, 129β30 |
KeyPoint Government Solutions and, 129 |
Opperman v. Path, 91β92 |
OTA (Online Trust Alliance), 29, 34 |
βPanama Papersβ breach, 26 |
Parmet, Wendy, 76 |
Pascal, Amy, 151, 152 |
password managers, 183β84 |
passwords |
default factory passwords, 85 |
failure of, 164β67 |
human bandwidth problem and, 167β70 |
I Love My Password Book!, 169 |
Moneyball βhack,β 139β40 |
Password Minder, 169 |
password recovery questions, 171β72 |
The Personal Internet Address & Password Log Book, 169 |
SSNs as, 120β21, 126β27 |
worst passwords list, 119β20, 168 |
personal data security law. See also breach notification laws |
breach notification laws, 37, 38β47 |
Dorn VAMC data breach, 35β37 |
failure of, 60β61 |
overview, 37β38 |
private litigation, 37, 54β60 |
security safeguards laws, 37, 47β54 |
phishing attacks, 174β75 |
Evernote, 104β5 |
role in data breaches, 33 |
platforms, online, 90β93 |
Podesta, John, 26β27 |
Premera Blue Cross, 25 |
privacy and data security, 13β14 |
accountability and, 148β49 |
Ashley Madison, 146β47 |
BlueKai, 146 |
cybersecurity, 131β32 |
data mapping, 156β57 |
data minimization, 146β47, 156 |
data protection, 132 |
defined, 131β32 |
hacking, 140β42 |
integration of, 196β97 |
Moneyball βhack,β 139β40 |
OPM breach, 128β31 |
ransomware, 153β55 |
relationship between, 132β33 |
schism between, 133β37 |
Sony Pictures data breach, 150β53 |
surveillance tools, 147β48 |
weak privacy, 142β46 |
Privacy Rights Clearinghouse, 28 |
private litigation |
defined, 37 |
failure to help victims, 59β60 |
increase in data breach lawsuits, 54β55 |
βlegally cognizable harm,β 55β59 |
proactive approach, data security law, 192β93 |
Project Shield, 84 |
public health analogy, 76β77 |
ransomware attacks, 25, 26, 28 |
backing up files as protection against, 153β54 |
defined, 23β24 |
double-extortion model, 154β55 |
prescription drug abuse database of Virginia, 20 |
Symantec report on, 25 |
WannaCry, 103β4 |
reactive approach, data security law, 193 |
Reddit, 85β86, 150, 154 |
reducing harm of breaches, 195 |
Reilly v. Ceridian Corp, 56 |
Remijas v. Neiman Marcus Group, 58 |
responsibility and accountability |
amplifiers, 83, 93β99 |
collective responsibility, 109β10 |
compromised data due to lack of, 148β49 |
designers, 83β89 |
digital technology exceptionalism, 106β9 |
distributors, 83, 89β93 |
exploiters, 83, 103β4 |
facilitators, 83, 99β103 |
miseducators, 83, 104β6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.