O'Reilly logo

Governance and Internal Controls for Cutting Edge IT by Karen F. Worstell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 7: DATA MANAGEMENT

“As a general rule the most successful man in life is the man who has the best information.” Benjamin Disraeli

Data Protection for Cutting Edge IT

At the end of the first half of 2012, there were 562,854,336 records disclosed to unauthorized parties from 3,190 reported incidents across all industries since the Choice Point incident in 2005. It is not unusual for an individual to have multiple records breached, multiple credit cards reset on account of fraud, and to have multiple offers of credit monitoring services. Thirty-seven percent of those records were because of:

  • Unintended disclosure – Sensitive information posted publicly on a website, mishandled, or sent to the wrong party via e-mail, fax, or mail.
  • Physical ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required