This publication is presented to you through Paradigm Publishing Services
Stanford University Press
Chapter
Licensed
Unlicensed
Requires Authentication
Introduction
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Table of Contents v
- Acknowledgments ix
- Author Biographies xi
-
Section I: Introducing Corporate Information Security
- Introduction 3
- 1. Looking at Information Security Through an Interdisciplinary Lens 19
-
Section II : The Dual Nature of Information- Information as a Consumer and Corporate Asset
- 2. The Information Vulnerability Landscape 33
- 3. Reporting of Information Security Breaches 50
- 4. Information Security and Patents 64
- 5. Information Security and Trade Secrets 92
-
Section III : U.S. Corporate Information Security Regulation and Its Shortcomings
- 6. Information Security of Health Data 103
- 7. Information Security of Financial Data 121
- 8. Information Security of Children’s Data 145
-
Section IV: The Future of Corporate Information Security and Law
- 9. Information Security and Contracts 159
- 10. Information Security, Law, and Data-Intensive Business Models 202
- Conclusion 228
- Notes 235
- Bibliography 295
- Index 333
Chapters in this book
- Frontmatter i
- Table of Contents v
- Acknowledgments ix
- Author Biographies xi
-
Section I: Introducing Corporate Information Security
- Introduction 3
- 1. Looking at Information Security Through an Interdisciplinary Lens 19
-
Section II : The Dual Nature of Information- Information as a Consumer and Corporate Asset
- 2. The Information Vulnerability Landscape 33
- 3. Reporting of Information Security Breaches 50
- 4. Information Security and Patents 64
- 5. Information Security and Trade Secrets 92
-
Section III : U.S. Corporate Information Security Regulation and Its Shortcomings
- 6. Information Security of Health Data 103
- 7. Information Security of Financial Data 121
- 8. Information Security of Children’s Data 145
-
Section IV: The Future of Corporate Information Security and Law
- 9. Information Security and Contracts 159
- 10. Information Security, Law, and Data-Intensive Business Models 202
- Conclusion 228
- Notes 235
- Bibliography 295
- Index 333