skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 40374 Find in a Library
Title: IMPLICATIONS OF PRIVACY LEGISLATION ON THE USE OF COMPUTER TECHNOLOGY IN BUSINESS
Author(s): R M DAVIS
Corporate Author: US Dept of Commerce
National Bureau of Standards
United States of America
Date Published: 1976
Page Count: 16
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
National Technical Information Service
Springfield, VA 22151
US Dept of Commerce
Washington, DC 20234
Sale Source: National Technical Information Service
US Dept of Commerce
5285 Port Royal Road
Springfield, VA 22151
United States of America

National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Document: PDF
Language: English
Country: United States of America
Annotation: THIS REPORT DISCUSSES THE RESPONSE OF THE NATIONAL BUREAU OF STANDARDS IN DEVELOPING GUIDELINES TO ENSURE THAT INDIVIDUAL PRIVACY AND DATA SECURITY ARE PROVIDED FOR IN MODERN INFORMATION PROCESSING SYSTEMS.
Abstract: SAFEGUARDS FOR SECURITY AND PRIVACY ARE NOT IDENTICAL. THE LARGE NUMBER OF RECORD SYSTEMS PROCESSING PERSONAL RECORDS IN BOTH THE PUBLIC AND PRIVATE SECTORS POINTS UP THE MAGNITUDE OF THE PROBLEM OF RETROFITTING THESE SYSTEMS FOR SECURITY AND PRIVACY SAFEGUARDS. IN MANY CASES, SOPHISTICATED SYSTEMS ARE NOT REQUIRED, AND GOOD INFORMATION PRACTICES WILL BE SUFFICIENT TO MEET THE REQUIREMENTS. THE SAFEGUARDS DIFFER FOR EACH SYSTEM. THERE IS ALSO A NEED FOR AUDITING TECHNIQUES TO CHECK ON THE EFFECTIVENESS OF THE SAFEGUARDS PUT INTO PLACE. THE TECHNIQUES DEVELOPED WILL BE USEFUL IN PREVENTING COMPUTER FRAUD, ASSURING FUNCTIONAL FIDELITY, AND MAINTAINING DATA INTEGRITY DURING INPUT AND PROCESSING. (AUTHOR ABSTRACT)...PLO
Index Term(s): Computer aided operations; Computer privacy and security; Data integrity; Data security; Information Systems and Technology; National Bureau of Standards; Privacy Act of 1974; Right of privacy; Standards
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=40374

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.