We’ve all heard about the many very well publicized stories in the press about data breaches. Lost or stolen laptops, misplaced backup tapes, hackers, rogue employees, unsecured USB drives — these are just some of the threats out there in the world. Most of us know about the routine defenses — encrypting laptops, smartphones, and USB drives; quick login expiration intervals; strong passwords; intrusion detection and prevention systems; and locked down data centers are just some of the strategies to help mitigate these risks.
But looking at business systems in a more granular level, what can and should be done at the application level to protect data from the perspective of legality as it relates to a data breach?
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]