Access "Ten years later: The legacy of SB 1386 compliance on data privacy laws"
This article is part of the July/August 2013 / Volume 15 / No. 6 issue of Unlock new pathways to network security architecture
Whether or not you view the passage of California's SB 1386 data privacy law in 2003 as a watershed moment in the information security world, few can argue that its enactment significantly changed the infosec playing field. Although federal legislation had covered certain industry verticals (e.g., GLBA and HIPAA/HITECH), most activity involving broadly applicable privacy and information security laws has occurred at the state level. SB 1386 initiated much of this activity. Over time, a definite trend has emerged: reactive state laws dealing with cybercrime have given way to proactive laws requiring affirmative steps to secure information systems. Reactive state data privacy laws Flashback: SB 1386 Ten years ago in Information Security magazine, Randy Sabett examined how to achieve compliance with the then-new California SB 1386 privacy law. Early state data privacy laws criminalized various activities that today would collectively be referred to as “hacking.” These reactive laws focus primarily on the hacker—an elusive entity that even if apprehended could ... Access >>>
Premium Content for Free.
Beyond the Page: Network security architectures
by SearchSecurity.com Staff
In this special report, Dave Shackleford explores advanced network security architectures that help segment and isolate traffic with in your data center.
Third-party risk management: Horror stories? You are not alone
by MacDonnell Ulsch, Contributor
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.
- Beyond the Page: Network security architectures by SearchSecurity.com Staff
Unlock new pathways to network security architecture
by Dave Shackleford
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
Enterprise mobile security by the numbers
by Kathleen Richards, Features Editor
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?
- Unlock new pathways to network security architecture by Dave Shackleford
New data on enterprise mobile security
by Kathleen Richards, Features Editor
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
Ten years later: The legacy of SB 1386 compliance on data privacy laws
by Randy Sabett, Contributor
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws.
Is big data education a big failure?
by Doug Jacobson and Julie A. Rursch
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?
- New data on enterprise mobile security by Kathleen Richards, Features Editor
More Premium Content Accessible For Free
Unified threat management aspires to the enterprise class
Unified threat management (UTM) long focused on small and medium-sized businesses, but now it's climbing the ladder and attempting to become ...
Threat intelligence and risk: Why cybersecurity hangs in the balance
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
How to respond to the latest distributed denial-of-service attacks
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...