ENDNOTES

1. New Vantage Partners, “Big Data and AI Executive Survey 2019,” January 2019. Available at http://newvantage.com/wp-content/uploads/2018/12/Big-Data-Executive-Survey-2019-Findings-Updated-010219-1.pdf (accessed February 17, 2020).

2. Ponemon Institute, “2019 Cost of Data Breach Study: Global Analysis,” undated. Available at https://www.ibm.com/security/data-breach (accessed February 17, 2020).

3. International Organization for Standardization, “ISO/IEC 27001:2013, Information Technology–Security Techniques–Information Security Management Systems–Requirements,” 2013. Available at https://www.iso.org/standard/54534.html (accessed July 25, 2020).

4. Federal Information Security Management Act of 2002, Title III of the E-Government Act of 2002, U.S. Code Vol. 44, sec. 3541 et seq. (2012).

5. U.S. Government Accountability Office, “High Risk Series: Substantial Efforts Needed to Achieve Greater Progress on High Risk Areas,” March 2019. Available at https://www.gao.gov/products/gao-19-157sp (accessed February 18, 2020).

6. Pew Research Center, “Mobile Technology and Home Broadband 2019,” June 2019. Available at https://www.pewresearch.org/internet/2019/06/13/mobile-technology-and-home-broadband-2019/ (accessed February 18, 2020).

7. American Management Association, “The Latest on Workplace Monitoring and Surveillance,” April 8, 2019. Available at https://www.amanet.org/articles/the-latest-on-workplace-monitoring-and-surveillance/ (accessed February 21, 2020).

8. Civil Rights Act of 1964, Pub. L. No. 88-352, 78 Stat. 241, codified as amended in scattered sections throughout U.S. Code Vols. 2, 28, and 42 (2012).

9. National Retail Federation, “Thanksgiving Weekend Draws Nearly 190 Million Shoppers, Spending Up 16 Percent,” December 3, 2019. Available at https://nrf.com/media-center/press-releases/thanksgiving-draws-nearly-190-million-shoppers (accessed February 21, 2020).

10. Health Insurance Portability and Accountability Act of 1996 (HIPAA), Pub. L. No. 104-191, codified at U.S. Code Vol. 42, sec. 1320d (2012).

11. Gramm-Leach-Bliley Act (1999), Title V of the Financial Services Modernization Act of 1999, Pub. L. No. 106-102, 113 Stat. 1338, codified at U.S. Code Vol. 15, sec. 6801, et seq. (2012).

12. Happ, Christian, André Melzer, and Georges Steffgen, “Trick With Treat—Reciprocity Increases the Willingness to Communicate Personal Data,” 2016. Computers in Human Behavior. Available at https://www.researchgate.net/publication/298187172_Trick_with_Treat_-_Reciprocity_Increases_the_Willingness_to_Communicate_Personal_Data (accessed February 20, 2020).

13. TechRepublic, “88% of Employees Have No Clue About Their Organization’s IT Security Policies,” January 11, 2018. Available at https://www.techrepublic.com/article/88-of-employees-have-no-clue-about-their-organizations-it-security-policies/ (accessed February 20, 2020).

14. McGraw, Gary, and Ed Felten, Securing Java. New York, NY: John Wiley & Sons, Inc., 1999. Also available at http://www.securingjava.com/ (accessed February 20, 2020). View Chapter 1, part 7.

15. Autoliv ASP, Inc. v. Department of Workforce Services, 29 P.3d 7 (Utah Ct. Appeals, 2001). All quoted statements are from this case.

16. Autoliv, 29 P.3d at 11.

17. Autoliv, 29 P.3d at 12–13.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset