NovaCat - NSU Libraries Catalog user info Skip the menu to the main content
     

Cover for {{ rc.info.title }}

{{rc.info.title}}

{{ rc.info.subtitle }}

{{ rc.info.author }}

{{ rc.info.edition }}

{{ rc.info.publisher }} {{ rc.info.year }}

Summary

{{rc.info.summary}} {{rc.info.summaryMore}}

Location Call # Volume Status
 E-Audiobook      
Author Solove, Daniel J., 1972- author.
Title Breached! : why data security law fails and how to improve it / by Daniel J. Solove & Woodrow Hartzog.
Edition [First edition].
OCLC on1313952420
ISBN 9781705056271 (electronic audio bk.)
170505627X (electronic audio bk.)
Publisher [Prince Frederick, Maryland] : Recorded Books, 2022.
Description 1 online resource (1 audio file (07 hr., 22 min.))
072200
digital rdatr
audio file rdaft
LC Subject heading/s Data protection -- Law and legislation -- United States.
Computer security -- Law and legislation -- United States.
Computer networks -- Security measures -- United States.
LC
Genre heading/s
Audiobooks.
Other
Genre heading/s
Downloadable audiobooks.
Electronic audiobooks.
Participant or performer note Read by Jim Frangione.
Summary Digital connections permeate our lives--and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how difficult it is to secure our personal information. Despite the passage of many data security laws, data breaches are increasing at a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on privacy and data security issues, argue that the law fails because, ironically, it focuses too much on the breach itself. Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented or mitigated through better rules and often inexpensive, non-cumbersome means. They also reveal why the current law is counterproductive. It pummels organizations that have suffered a breach but doesn't recognize how others contribute to the breach. These outside actors include software companies that create vulnerable software, device companies that make insecure devices, government policymakers who write regulations that increase security risks, organizations that train people to engage in risky behaviors, and more. Although humans are the weakest link for data security, the law remains oblivious to the fact that policies and technologies are often designed with a poor understanding of human behavior. Breached! corrects this course by focusing on the human side of security. This book sets out a holistic vision for data security law--one that holds all actors accountable, understands security broadly and in relationship to privacy, looks to prevention and mitigation rather than reaction, and is designed with people in mind. The book closes with a roadmap for how we can reboot law and policy surrounding data security.
Source of Description Online resource; title from title details screen (O'Reilly, viewed May 4, 2022).
NOTE O'Reilly O'Reilly Online Learning: Academic/Public Library Edition (EZproxy Access)
Permanent link back to this item
https://novacat.nova.edu:446/record=b4320880~S13

Use classic NovaCat |