๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Protecting your confidential information

โœ Scribed by David P. Lewis


Publisher
Elsevier Science
Year
1988
Tongue
English
Weight
664 KB
Volume
4
Category
Article
ISSN
0267-3649

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


Is your auditor protecting your confiden
โœ Abbie Gail Parham; Leslie B. Fletcher; A. Lee Gurley III ๐Ÿ“‚ Article ๐Ÿ“… 1998 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 342 KB

## Independent auditors are required to maintain the confidentiality of client-related information. But a published study suggests that accounting firms may not be providing adequate protection for confidential client electronic data on PCs or laptops. The authors detail some key steps CFOs should t

Protecting software and confidential inf
โœ John Warchus ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 234 KB

This important recent decision has illustrated the approach taken by English Courts to allegations of infringement of copyright in software programs and has also explained the use which can be made by former employees of confidential information in an IT setting. The main parties to this action wer

Ethics and Information Technology: Prote
โœ Peter A. Stanwick; Sarah D. Stanwick ๐Ÿ“‚ Article ๐Ÿ“… 2001 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 64 KB

## Abstract Companies that rely heavily on electronic information processing cannot afford an ethical slip. __ยฉ 2001 John Wiley & Sons, Inc.__

Confidentiality of information
โœ H. Roos ๐Ÿ“‚ Article ๐Ÿ“… 1981 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 473 KB

lb relationship between or~nlardon W-UC~\*W, the rup-lrar&tfl Itlformatiion rysteme and tJtc ~~nt~~~~~S~t~ 1~5ue, dofirles the end UW'~ reryendbillty f'tx information cont-rol. Kn a data ah environment end use 1Leir mutual onribtllty for shared admtitntor Ir the natural author&y to rontr~d the execu