What to Do When Your Data Is Breached
Gespeichert in:
Veröffentlicht in: | GP solo 2016-01, Vol.33 (1), p.24-27 |
---|---|
Hauptverfasser: | , , |
Format: | Magazinearticle |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 27 |
---|---|
container_issue | 1 |
container_start_page | 24 |
container_title | GP solo |
container_volume | 33 |
creator | Nelson, Sharon D. Ries, David G. Simek, John W. |
description | |
format | Magazinearticle |
fullrecord | <record><control><sourceid>jstor</sourceid><recordid>TN_cdi_jstor_primary_44736851</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><jstor_id>44736851</jstor_id><sourcerecordid>44736851</sourcerecordid><originalsourceid>FETCH-jstor_primary_447368513</originalsourceid><addsrcrecordid>eNpjYuA0MjQz1jU0NzJnYeA0NDWy0DUztojgYOAqLs4yMDA2NLcw4mRQDc9ILFEoyVdwyVcIz0jNU4jMLy1ScEksSVTwLFZwKkpNTM5ITeFhYE1LzClO5YXS3Ayybq4hzh66WcUl-UXxBUWZuYlFlfEmJubGZhamhsaE5AEKaSqu</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>magazinearticle</recordtype></control><display><type>magazinearticle</type><title>What to Do When Your Data Is Breached</title><source>Jstor Complete Legacy</source><source>HeinOnline Law Journal Library</source><creator>Nelson, Sharon D. ; Ries, David G. ; Simek, John W.</creator><creatorcontrib>Nelson, Sharon D. ; Ries, David G. ; Simek, John W.</creatorcontrib><identifier>ISSN: 1528-638X</identifier><identifier>EISSN: 2163-1727</identifier><language>eng</language><publisher>American Bar Association</publisher><subject>Attorneys ; Cybersecurity ; Data breaches ; Data security ; Digital forensics ; Information technology ; Insurance policies ; Law firms</subject><ispartof>GP solo, 2016-01, Vol.33 (1), p.24-27</ispartof><rights>Copyright © 2016 American Bar Association</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/44736851$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/44736851$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>776,780,799,57995,58228</link.rule.ids></links><search><creatorcontrib>Nelson, Sharon D.</creatorcontrib><creatorcontrib>Ries, David G.</creatorcontrib><creatorcontrib>Simek, John W.</creatorcontrib><title>What to Do When Your Data Is Breached</title><title>GP solo</title><subject>Attorneys</subject><subject>Cybersecurity</subject><subject>Data breaches</subject><subject>Data security</subject><subject>Digital forensics</subject><subject>Information technology</subject><subject>Insurance policies</subject><subject>Law firms</subject><issn>1528-638X</issn><issn>2163-1727</issn><fulltext>true</fulltext><rsrctype>magazinearticle</rsrctype><creationdate>2016</creationdate><recordtype>magazinearticle</recordtype><sourceid/><recordid>eNpjYuA0MjQz1jU0NzJnYeA0NDWy0DUztojgYOAqLs4yMDA2NLcw4mRQDc9ILFEoyVdwyVcIz0jNU4jMLy1ScEksSVTwLFZwKkpNTM5ITeFhYE1LzClO5YXS3Ayybq4hzh66WcUl-UXxBUWZuYlFlfEmJubGZhamhsaE5AEKaSqu</recordid><startdate>20160101</startdate><enddate>20160101</enddate><creator>Nelson, Sharon D.</creator><creator>Ries, David G.</creator><creator>Simek, John W.</creator><general>American Bar Association</general><scope/></search><sort><creationdate>20160101</creationdate><title>What to Do When Your Data Is Breached</title><author>Nelson, Sharon D. ; Ries, David G. ; Simek, John W.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-jstor_primary_447368513</frbrgroupid><rsrctype>magazinearticle</rsrctype><prefilter>magazinearticle</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Attorneys</topic><topic>Cybersecurity</topic><topic>Data breaches</topic><topic>Data security</topic><topic>Digital forensics</topic><topic>Information technology</topic><topic>Insurance policies</topic><topic>Law firms</topic><toplevel>online_resources</toplevel><creatorcontrib>Nelson, Sharon D.</creatorcontrib><creatorcontrib>Ries, David G.</creatorcontrib><creatorcontrib>Simek, John W.</creatorcontrib><jtitle>GP solo</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nelson, Sharon D.</au><au>Ries, David G.</au><au>Simek, John W.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>What to Do When Your Data Is Breached</atitle><jtitle>GP solo</jtitle><date>2016-01-01</date><risdate>2016</risdate><volume>33</volume><issue>1</issue><spage>24</spage><epage>27</epage><pages>24-27</pages><issn>1528-638X</issn><eissn>2163-1727</eissn><pub>American Bar Association</pub></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1528-638X |
ispartof | GP solo, 2016-01, Vol.33 (1), p.24-27 |
issn | 1528-638X 2163-1727 |
language | eng |
recordid | cdi_jstor_primary_44736851 |
source | Jstor Complete Legacy; HeinOnline Law Journal Library |
subjects | Attorneys Cybersecurity Data breaches Data security Digital forensics Information technology Insurance policies Law firms |
title | What to Do When Your Data Is Breached |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T02%3A29%3A41IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-jstor&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=What%20to%20Do%20When%20Your%20Data%20Is%20Breached&rft.jtitle=GP%20solo&rft.au=Nelson,%20Sharon%20D.&rft.date=2016-01-01&rft.volume=33&rft.issue=1&rft.spage=24&rft.epage=27&rft.pages=24-27&rft.issn=1528-638X&rft.eissn=2163-1727&rft_id=info:doi/&rft_dat=%3Cjstor%3E44736851%3C/jstor%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_jstor_id=44736851&rfr_iscdi=true |