Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,413,716 papers from all fields of science
Search
Sign In
Create Free Account
Security breach notification laws
Known as:
Breach notification
, Data breach notification laws
Security breach notification laws or data breach notification laws are laws that require an entity that has been subject to a data breach to notify…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
California S.B. 1386
Data breach
Information security
Personally identifiable information
Broader (2)
Computer security
Information sensitivity
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Global InfoSec and Breach Standards
R. Heimes
IEEE Security and Privacy
2016
Corpus ID: 10127298
The European Commission's General Data Protection Regulation (GDPR) offers contextual data security and breach notification…
Expand
2015
2015
Multi user searchable encryption schemes using Trusted Proxy for cloud based Relational Databases
K. Mallaiah
,
S. Ramachandram
,
R. Gandhi
International Conference on Green Computing and…
2015
Corpus ID: 18368727
Use of cloud Database-as-a-Service (DaaS) is gradually increasing in private and government organizations. Organizations are now…
Expand
2014
2014
개인정보 보호법상의 개인정보 유출통지제도 및 미국의 개인정보 유출통지법(Security Breach Notification Laws)의 비교연구
강성영
2014
Corpus ID: 156565302
Identity theft presents real financial and national security threats that must be met with a broad spectrum of resources. One way…
Expand
Review
2013
Review
2013
The 2012 CLSR-LSPI seminar on privacy, data protection & cyber-security - Presented at the 7th international conference on Legal, Security and Privacy Issues in IT law (LSPI) October 2-4, 2012…
S. Saxby
Computer Law and Security Review
2013
Corpus ID: 60679458
Review
2012
Review
2012
Single and Double Power Laws for Cyber Crimes
R. Overill
,
Jantje A. M. Silomon
2012
Corpus ID: 7972383
Eleven years of financial loss data from the CSI annual Computer Crime and Security surveys have been analysed to discover…
Expand
2012
2012
A Simple Compromise: The Need for a Federal Data Breach Notification Law
J. M. Tom
2012
Corpus ID: 159872844
2011
2011
Taiwan Revises its Data Protection Act
G. Greenleaf
2011
Corpus ID: 167516693
Taiwan’s Computer Processed Personal Data Protection Act of 1995 was pioneering data protection legislation in Asia, but had many…
Expand
2011
2011
Comparing requirements from multiple jurisdictions
David G. Gordon
,
T. Breaux
Fourth International Workshop on Requirements…
2011
Corpus ID: 6871709
Increasingly, information systems are becoming distributed and pervasive, enabling organizations to deliver services remotely to…
Expand
2009
2009
Federal Security Breach Notifications: Politics and Approaches
Priscilla M. Regan
2009
Corpus ID: 150894235
2008
2008
Beyond Whiffle-Ball Bats: Addressing Identity Crime in an Information Economy, 26 J. Marshall J. Computer & Info. L. 47 (2008)
Erin E. Kenneally
,
John Stanley
2008
Corpus ID: 153295662
The article discusses the challenges to the protection of private personal information in the age of rapid technological changes…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE