O'Reilly logo

Beginning SQL Server 2008 Administration by Carmen Taglienti, Grant Fritchey, Robert E. Walters

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Auditing, Encryption, and Compliance

According to the Privacy Rights Clearinghouse, more than 255 million records with sensitive information have been breached since January 2005. If you browse through the detailed report at http://www.privacyrights.org/ar/ChronDataBreaches.htm, you'll see that there are many kinds of breaches of stolen data. In some cases, there were stolen laptops; in others, it was in inside job by a disgruntled employee. This report yields an almost endless supply of breaches of stolen data.

As a customer of a business, you want to feel confident that a stolen laptop thousands of miles away will not have you repairing your credit report for years. Businesses need you, the customer, to have this faith.

The payment ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required