Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr.
It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr.
Fordham Journal of Corporate & Financial Law
This Article asserts that the move from the industrial age to the
information age represents a fundamental change to our society on
such a widespread basis that the legal order must reexamine the
premises about how our society functions, assessing whether
foundational elements of U.S. Common Law remain valid. This
Article first confronts briefly the continuing acceptance of certain
foundational premises in contract and intellectual property law,
illustrating that such premises are no longer supported by the
realities of modern society. With fundamental change challenging
multiple areas of law in the information age, this problem is worthy
of widespread inquiry …
Property As Control: The Case Of Information, Jane B. Baron
Property As Control: The Case Of Information, Jane B. Baron
Michigan Telecommunications & Technology Law Review
If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …