Skip to Content
Securing Cloud and Mobility
book

Securing Cloud and Mobility

by Ian Lim, E. Coleen Coolidge, Paul Hourani
February 2013
Intermediate to advanced content levelIntermediate to advanced
228 pages
4h 53m
English
Auerbach Publications
Content preview from Securing Cloud and Mobility

6Encryption Services

6.1 Holistic Encryption Strategy

Encryption is driven by compliance requirements and data threats. Senate Bill 1386, which became effective on July 1, 2003, mandated that notification must be made to California residents if there is reasonable cause to suspect the breach of their unencrypted personal information. The operative word is unencrypted. Many companies have moved to encrypt personal information to avoid the hefty costs and reputational damage of breach notification. The Health Information Technology for Economic and Clinical Health Act (HITECH) enacted in 2009 to complement the Health Insurance Portability and Accountability Act (HIPAA) has encryption implications. Similar to SB1386, HITECH requires breach ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Resilient Infrastructure: Detect, Protect, and Mitigate Threats Against Brocade SAN FOS with IBM QRadar

Cyber Resilient Infrastructure: Detect, Protect, and Mitigate Threats Against Brocade SAN FOS with IBM QRadar

IBM Storage

Publisher Resources

ISBN: 9781439850558