Access Control and Identity Management

Laws to Deter Information Theft

Espionage between organizations used to require a physical act, such as stealing paper documents and making physical copies. Identity theft was a factor only if someone lost a wallet or if it was stolen. Although information technologies such as networked file servers, tablets, and web-based applications have made data easier to manage, IT has also made that information far more vulnerable.

Federal and state laws have been created to act as deterrents to information theft. These laws require organizations to take steps to protect the sensitive data stored, processed, or transmitted by their IT infrastructure. There are penalties for both stealing information and failing ...

Get Access Control and Identity Management, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.