Security Against Compelled Disclosure
نویسندگان
چکیده
Various existing and pending legislation can be used to force individuals and organisations to disclose confidential information. Courts may order a wide variety of data to be turned over by either party in civil and criminal cases. Government agencies are explicitly tasked with protecting “national economic security.” And organised crime will target information just like any other valuable asset. In a less than perfectly ethical world, companies require means to protect their information assets against economic espionage, misuse of discovery processes and criminal coercion. We describe actual and potential examples of compelled disclosure abuses in the US and UK, and legal enhancements to conventional security services for protecting communications and stored data against their recurrence.
منابع مشابه
A note on the security of two improved RFID protocols
Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...
متن کاملA matter of context: Casey and the constitutionality of compelled physician speech.
Under the Supreme Court's compelled speech cases, the context of government-mandated disclosures determines the standard of review. Pursuant to Casey, Zauderer, and Whalen, compelled disclosures in the medical context, such as speech-and-display ultrasound laws, are subject to - and survive - a form of rational basis scrutiny.
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملInformation Disclosure Incidents and Computing Education
We present an introduction to security incident encountered by academic institutions and follow up with our approach to user education by infusing information disclosure incidents in two courses laying at the extremes of the computer science curriculum: a General Education Introduction to Computing and an Advanced Topics Information Security course. The choice of the two courses is such that, w...
متن کاملCryptanalysis of the Fast Lightweight Mutual Authentication Protocol
Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here we examine the security strengths of FLMAP through systematic cryptanalysis test...
متن کامل