The escalation of security breaches involving personally identifiable information (PII) has contributed to the loss of millions of records over the past few years. Breaches involving PII are hazardous to both individuals and org. Individual harms may include identity theft, embarrassment, or blackmail. Organ. harms may include a loss of public trust, legal liability, or remediation costs. To protect the confidentiality of PII, org. should use a risk-based approach. This report provides guidelines for a risk-based approach to protecting the confidentiality of PII. The recommend. here are intended primarily for U.S. Fed. gov¿t. agencies and those who conduct business on behalf of the agencies, but other org. may find portions of the publication useful.
The ABA Journal serves the legal profession. Qualified recipients are lawyers and judges, law students, law librarians and associate members of the American Bar Association.
Report contains 3 parts, 19 -1979: pt. 1. Senate -- pt. 2. Assembly -- pt. 3. Subject index; contains 4 parts, 1981: pt. 1 Senate -- pt. 2. Administrative rules -- pt. 3. Assembly -- pt. 4. Index; contains 5 parts, 1983-1995: pt. 1 Senate -- pt. 2. Administrative rules -- pt. 3. Assembly -- pt. 4. Index -- pt. 5. Index to Wisconsin acts; contains 6 parts, 1997-2007/2008: pt. 1 Senate -- pt. 2. Administrative rules -- pt. 3. Directories of registered lobbying organizations, licensed lobbyists, state agencies legislative liaisons -- pt. 4. Assembly -- pt. 5. Index -- pt. 6. Index to Wisconsin acts; 2009/2010: pt. 1 Senate -- pt. 2. Administrative rules -- pt. 3. Assembly -- pt. 4. Index -- pt. 5. Index to Wisconsin acts -- pt. 6. Registered lobbying organizations, licensed lobbyists, state agencies legislative liaisons; 2011/2012-2015/2016: pt. 1 Senate -- pt. 2. Administrative rules -- pt. 3. Assembly -- pt. 4. Index -- pt. 5. Index to Wisconsin acts.