SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010
dc.contributor.author | Blumenthal, Don | en_US |
dc.date.accessioned | 2010-10-26T19:34:06Z | |
dc.date.available | 2010-10-26T19:34:06Z | |
dc.date.issued | 2010-08 | en_US |
dc.identifier.citation | Blumenthal, D. (2010, August 24). Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues. Retrieved from Open.Michigan - Educational Resources Web site: http://open.umich.edu/education/si/si510/winter2010. <http://hdl.handle.net/2027.42/78191> | en_US |
dc.identifier.uri | https://hdl.handle.net/2027.42/78191 | |
dc.description | As data collection and information networks expand (and stories of security breaches and the misuse of personal information abound), data security and privacy issues are increasingly central parts of the information policy landscape. Legislators, regulators, businesses, and other institutions of all kinds are under increasing pressure to draft and implement effective laws, regulations, and security and privacy programs under rapidly changing technological, business, and legal conditions. A strong need is arising for individuals with the training and skills to work in this unsettled and evolving environment. This course examines security issues related to the safeguarding of sensitive personal and corporate information against inadvertent disclosure; policy and societal questions concerning the value of security and privacy regulations, the real-world effects of data breaches on individuals and businesses, and the balancing of interests among individuals, government, and enterprises; current and proposed laws and regulations that govern data security and privacy; private-sector regulatory efforts and self-help measures; emerging technologies that may affect security and privacy concerns; and issues related to the development of enterprise data security programs, policies, and procedures that take into account the requirements of all relevant constituencies, e.g., technical, business, and legal. | en_US |
dc.format.extent | 3114 bytes | |
dc.format.extent | 9621 bytes | |
dc.format.extent | 802478 bytes | |
dc.format.extent | 780800 bytes | |
dc.format.extent | 3514747 bytes | |
dc.format.extent | 7006528 bytes | |
dc.format.extent | 3468288 bytes | |
dc.format.extent | 691712 bytes | |
dc.format.extent | 3787776 bytes | |
dc.format.extent | 4999906 bytes | |
dc.format.extent | 3293019 bytes | |
dc.format.extent | 731136 bytes | |
dc.format.extent | 836096 bytes | |
dc.format.extent | 3192850 bytes | |
dc.format.extent | 650752 bytes | |
dc.format.extent | 11326796 bytes | |
dc.format.extent | 1423664 bytes | |
dc.format.extent | 892416 bytes | |
dc.format.extent | 3388967 bytes | |
dc.format.extent | 986624 bytes | |
dc.format.extent | 4130398 bytes | |
dc.format.extent | 662528 bytes | |
dc.format.extent | 430255 bytes | |
dc.format.extent | 3347419 bytes | |
dc.format.extent | 1053184 bytes | |
dc.format.extent | 1891346 bytes | |
dc.format.extent | 1501184 bytes | |
dc.format.extent | 718848 bytes | |
dc.format.extent | 2295995 bytes | |
dc.format.extent | 614400 bytes | |
dc.format.extent | 222010 bytes | |
dc.format.extent | 57214186 bytes | |
dc.format.mimetype | text/plain | |
dc.format.mimetype | application/rdf+xml | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/pdf | |
dc.format.mimetype | application/vnd.ms-powerpoint | |
dc.format.mimetype | application/octet-stream | |
dc.format.mimetype | application/zip | |
dc.language | English | en_US |
dc.publisher | Open.Michigan | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.subject | Data Security, Information Policy, Privacy, Security Regulations | en_US |
dc.title | SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 | en_US |
dc.type | Learning Object | en_US |
dc.subject.hlbsecondlevel | Information Science | en_US |
dc.subject.hlbtoplevel | Social Sciences | en_US |
dc.contributor.affiliationum | School of Information | en_US |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/5/blumenthal-si510-w10-lecture11-peopleandprocesses.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/6/blumenthal-si510-w10-lecture3.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/7/blumenthal-si510-w10-lecture7.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/8/blumenthal-si510-w10-lecture2.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/9/blumenthal-si510-w10-lecture11-internethistory.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/10/blumenthal-si510-w10-lecture4.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/11/blumenthal-si510-w10-lecture10.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/12/blumenthal-si510-w10-lecture11-internethistory.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/13/blumenthal-si510-w10-lecture8.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/14/blumenthal-si510-w10-lecture1_0.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/15/blumenthal-si510-w10-lecture7.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/16/blumenthal-si510-w10-lecture6.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/17/blumenthal-si510-w10-lecture12-datadisruption.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/18/blumenthal-si510-w10-lecture9.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/19/blumenthal-si510-w10-lecture12-datadisruption.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/20/blumenthal-si510-w10-lecture8.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/21/blumenthal-si510-w10-lecture4.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/22/blumenthal-si510-w10-lecture2.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/23/blumenthal-si510-w10-lecture3.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/24/blumenthal-si510-w10-lecture12-technologyandplanning.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/25/blumenthal-si510-w10-lecture10.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/26/blumenthal-si510-w10-lecture1_0.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/27/blumenthal-si510-w10-lecture11-peopleandprocesses.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/28/blumenthal-si510-w10-lecture12-technologyandplanning.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/29/blumenthal-si510-w10-lecture9.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/30/blumenthal-si510-w10-lecture6.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/31/blumenthal-si510-w10-lecture5.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/32/blumenthal-si510-w10-lecture5.ppt | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/33/si510-w10-syllabus.pdf | |
dc.description.bitstreamurl | http://deepblue.lib.umich.edu/bitstream/2027.42/78191/34/si510-winter2010.zip | |
dc.owningcollname | Open Educational Resources |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.