unauthorized disclosure
Recently Published Documents


TOTAL DOCUMENTS

24
(FIVE YEARS 1)

H-INDEX

3
(FIVE YEARS 0)

Algorithms ◽  
2021 ◽  
Vol 14 (4) ◽  
pp. 124
Author(s):  
La Zakaria ◽  
Endah Yuliani ◽  
Asmiati Asmiati

Cryptography is the science and study of protecting data in computer and communication systems from unauthorized disclosure and modification. An ordinary difference equation (a map) can be used in encryption–decryption algorithms. In particular, the Arnold’s cat and the sine-Gordon linear maps can be used in cryptographic algorithms for encoding digital images. In this article, a two-dimensional linear mKdV map derived from an ordinary difference mKdV equation will be used in a cryptographic encoding algorithm. The proposed encoding algorithm will be compared with those generated using sine-Gordon and Arnold’s cat maps via the correlations between adjacent pixels in the encrypted image and the uniformity of the pixel distribution. Note that the mKdV map is derived from the partial discrete mKdV equation with Consistency Around the Cube (CAC) properties, whereas the sine-Gordon map is derived from the partial discrete sine-Gordon equation, which does not have CAC properties.


Author(s):  
Marie Simon ◽  
Vincent Looten

Although the consequences of the General Data Protection Regulation (GDPR) have been widely discussed, the violations have not been described in medical literature. In this study, we focus our analyses on the data breach notifications, in France, defined in the article 4 of GDPR as “a breach of security resulting, accidentally or unlawfully, in the destruction, loss, alteration, unauthorized disclosure of personal data transmitted, stored or otherwise processed, or unauthorized access to such data.” Among 3,824 data breach notifications reported between May 2018 and February 2020, 244 (6.4%) is related to the health sector. Loss of confidentiality is the most important breach (80.7%) in this sector, followed by the loss of availability (27.5%). Malicious cause occurred in 58.2% of them. We hypothesized a phenomenon of underreported data breach incidents in health due to a mismatch between cybersecurity and data privacy issues.


Author(s):  
Matthew Patrick Shaw

Because of the U.S. Supreme Court case, Plyler v. Doe, most immigrant students have a right to the same free, public K–12 education as their U.S. citizen peers, regardless of their residency status. Immigrant students are also covered by the same privacy laws that shield citizen students from unauthorized disclosure of sensitive information. In theory, these laws should work together to shield immigrant students from governmental and nongovernmental agents who might act adversely against these students and their families. Despite these apparent protections, immigrant students face special challenges that complicate their pursuit of guaranteed primary and secondary education. Most of these challenges are linked to limits within the logic of Plyler as it relates to federal immigration law. This chapter discusses how conflicts between these laws and their enforcement both define immigrant status and utilize it as a means to facilitate and frustrate access to educational opportunity. Any plausible efforts to minimize these challenges must negotiate this conflict with an eye toward improving immigrants’ access to education and collateral services.


2020 ◽  
Vol 2 (1) ◽  
pp. 55-61
Author(s):  
Żywiołek Justyna ◽  
Nedeliaková Eva

AbstractThe article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.


2019 ◽  
pp. 38-40
Author(s):  
Serhii SELISHCHEV

The article investigates and systematizes the requirements for maintaining confidentiality in carrying out the audit of compliance with the principle of continuity of activity by the management personnel of the company during the preparation of financial statements. The components of the audit quality assurance system have been researched and further developed, in particular in the context of ensuring confidentiality. Particular attention has been paid to the specifics of the audit evidence database, to the identification of key financial indicators and the associated risks of unauthorized disclosure. When verifying that the principle of business continuity is audited, the auditor is confronted with information that is the consequence or prerequisite for making strategic management decisions. This information is valuable to competitors of the company being verified, which in turn can provoke its disclosure by the auditor - that is, there is a risk of disclosure of trade secrets. The purpose is to develop a methodology for building a system for preventing the disclosure of information by the auditor, obtained when checking compliance with the principle of business continuity. An analysis of current practice indicates that there is a significant risk of misuse of auditors by information obtained during the audit, which violates professional secrecy, in particular, when checking compliance with the principle of business continuity. Based on the problem, we have proposed a number of policy recommendations for the development of an internal corporate policy of non-disclosure and confidentiality of information at the audit firm, in particular in the aspect of strategic information used in the continuity audit. This made it possible to obtain a sufficient level of staff awareness of the nature of the breach of the principle of confidentiality and future liability.


2019 ◽  
Vol 1 (1) ◽  
pp. 132-140
Author(s):  
Michał Pałęga ◽  
Marcin Knapiński

AbstractThe strategic importance of information for the functioning of each economic entity forces entrepreneurs to properly protect them against loss, unauthorized disclosure or unauthorized modification. Hence, organizations build complex security systems taking into account state-of-the-art technical solutions, while belittling often the most important element, which is the human factor. It should be emphasized that it is the intentional or accidental actions of the human that can lead to the loss of information security. In addition, it is also the potential of human capabilities and skills can provide an effective defense against the failure or technical security.The article presents the basic stages of human resource management in the aspect of information security. Complementing these considerations will be the presentation and discussion of the results of surveys aimed at assessing the level of employee awareness in the area of information security.


2018 ◽  
Vol 40 (1) ◽  
pp. 85-99
Author(s):  
Mirosław Karpiuk

POSITION OF PERSONAL SECURITY IN THE SYSTEMFOR PROTECTING CLASSIFIED INFORMATIONOne of the constituents of the state security is protecting information against unauthorized disclosure which would or could be harmful for the Polish state, or would be adverse for its interests, regardless of the form and the way they are expressed. Being classified, such information may be made available only to those who guarantee secrecy, and only to the extent necessary to perform their job or service on a given position, or perform duties entrusted. A screening, being an element of personal security, can prove whether a person guarantees secrecy or not. This procedure is to de­termine if, after obtaining access to classified information, a person tested would constitute doubts as far as the existence of unauthorized disclosure of classified information is concerned. A security clearance providing access to classified information has to be issued after a thorough examination, and only to the person guaranteeing full secrecy.


2017 ◽  
Vol 98 (8) ◽  
pp. 74-75
Author(s):  
Julie Underwood

FERPA — the Family Education Rights and Privacy Act — protects student privacy by laying out when and how education records that are maintained by the school can be used within and outside of the school district and when student records can be released. FERPA’s goal is to prevent unauthorized disclosure of students’ personally identifiable information. School employees (and school attorneys) handle student records and data according to FERPA every day. But the law was enacted in 1974, before digital recordkeeping, big data, texts, email, the internet, and easy digital transmission of information, which means that much about FERPA is now outdated.


Author(s):  
Rahul Sagar

This chapter examines whether the law ought to condone unauthorized disclosures of classified information. The features that make the unauthorized disclosure of classified information an effective and credible regulatory mechanism are the very same ones that raise concerns about its lawfulness and legitimacy. Because such disclosures override the classification decisions made by officials responsible for national security, our reliance on them seems to conflict with our commitment to the rule of law and the norms of democracy. The chapter explains what the law has to say about unauthorized disclosures of classified information and shows that the law is not favorably disposed toward the official responsible for making the unauthorized disclosure. It also argues against revising the law to take account of the fact that unauthorized disclosures can allow lawmakers and citizens to become aware of misconduct that would otherwise be shielded by state secrecy.


Author(s):  
Rahul Sagar

This book examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, this book argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously—that is, to “leak” information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, the book claims, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism.


Sign in / Sign up

Export Citation Format

Share Document