What to Do When Your Data Is Breached

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:GP solo 2016-01, Vol.33 (1), p.24-27
Hauptverfasser: Nelson, Sharon D., Ries, David G., Simek, John W.
Format: Magazinearticle
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 27
container_issue 1
container_start_page 24
container_title GP solo
container_volume 33
creator Nelson, Sharon D.
Ries, David G.
Simek, John W.
description
format Magazinearticle
fullrecord <record><control><sourceid>jstor</sourceid><recordid>TN_cdi_jstor_primary_44736851</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>44736851</jstor_id><sourcerecordid>44736851</sourcerecordid><originalsourceid>FETCH-jstor_primary_447368513</originalsourceid><addsrcrecordid>eNpjYuA0MjQz1jU0NzJnYeA0NDWy0DUztojgYOAqLs4yMDA2NLcw4mRQDc9ILFEoyVdwyVcIz0jNU4jMLy1ScEksSVTwLFZwKkpNTM5ITeFhYE1LzClO5YXS3Ayybq4hzh66WcUl-UXxBUWZuYlFlfEmJubGZhamhsaE5AEKaSqu</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>What to Do When Your Data Is Breached</title><source>Jstor Complete Legacy</source><source>HeinOnline Law Journal Library</source><creator>Nelson, Sharon D. ; Ries, David G. ; Simek, John W.</creator><creatorcontrib>Nelson, Sharon D. ; Ries, David G. ; Simek, John W.</creatorcontrib><identifier>ISSN: 1528-638X</identifier><identifier>EISSN: 2163-1727</identifier><language>eng</language><publisher>American Bar Association</publisher><subject>Attorneys ; Cybersecurity ; Data breaches ; Data security ; Digital forensics ; Information technology ; Insurance policies ; Law firms</subject><ispartof>GP solo, 2016-01, Vol.33 (1), p.24-27</ispartof><rights>Copyright © 2016 American Bar Association</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/44736851$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/44736851$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>776,780,799,57995,58228</link.rule.ids></links><search><creatorcontrib>Nelson, Sharon D.</creatorcontrib><creatorcontrib>Ries, David G.</creatorcontrib><creatorcontrib>Simek, John W.</creatorcontrib><title>What to Do When Your Data Is Breached</title><title>GP solo</title><subject>Attorneys</subject><subject>Cybersecurity</subject><subject>Data breaches</subject><subject>Data security</subject><subject>Digital forensics</subject><subject>Information technology</subject><subject>Insurance policies</subject><subject>Law firms</subject><issn>1528-638X</issn><issn>2163-1727</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2016</creationdate><recordtype>magazinearticle</recordtype><sourceid/><recordid>eNpjYuA0MjQz1jU0NzJnYeA0NDWy0DUztojgYOAqLs4yMDA2NLcw4mRQDc9ILFEoyVdwyVcIz0jNU4jMLy1ScEksSVTwLFZwKkpNTM5ITeFhYE1LzClO5YXS3Ayybq4hzh66WcUl-UXxBUWZuYlFlfEmJubGZhamhsaE5AEKaSqu</recordid><startdate>20160101</startdate><enddate>20160101</enddate><creator>Nelson, Sharon D.</creator><creator>Ries, David G.</creator><creator>Simek, John W.</creator><general>American Bar Association</general><scope/></search><sort><creationdate>20160101</creationdate><title>What to Do When Your Data Is Breached</title><author>Nelson, Sharon D. ; Ries, David G. ; Simek, John W.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-jstor_primary_447368513</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Attorneys</topic><topic>Cybersecurity</topic><topic>Data breaches</topic><topic>Data security</topic><topic>Digital forensics</topic><topic>Information technology</topic><topic>Insurance policies</topic><topic>Law firms</topic><toplevel>online_resources</toplevel><creatorcontrib>Nelson, Sharon D.</creatorcontrib><creatorcontrib>Ries, David G.</creatorcontrib><creatorcontrib>Simek, John W.</creatorcontrib><jtitle>GP solo</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nelson, Sharon D.</au><au>Ries, David G.</au><au>Simek, John W.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>What to Do When Your Data Is Breached</atitle><jtitle>GP solo</jtitle><date>2016-01-01</date><risdate>2016</risdate><volume>33</volume><issue>1</issue><spage>24</spage><epage>27</epage><pages>24-27</pages><issn>1528-638X</issn><eissn>2163-1727</eissn><pub>American Bar Association</pub></addata></record>
fulltext fulltext
identifier ISSN: 1528-638X
ispartof GP solo, 2016-01, Vol.33 (1), p.24-27
issn 1528-638X
2163-1727
language eng
recordid cdi_jstor_primary_44736851
source Jstor Complete Legacy; HeinOnline Law Journal Library
subjects Attorneys
Cybersecurity
Data breaches
Data security
Digital forensics
Information technology
Insurance policies
Law firms
title What to Do When Your Data Is Breached
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T02%3A29%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=What%20to%20Do%20When%20Your%20Data%20Is%20Breached&rft.jtitle=GP%20solo&rft.au=Nelson,%20Sharon%20D.&rft.date=2016-01-01&rft.volume=33&rft.issue=1&rft.spage=24&rft.epage=27&rft.pages=24-27&rft.issn=1528-638X&rft.eissn=2163-1727&rft_id=info:doi/&rft_dat=%3Cjstor%3E44736851%3C/jstor%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_jstor_id=44736851&rfr_iscdi=true