skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 62935 Add to Shopping cart Find in a Library
Title: RISK ASSESSMENT MANAGEMENT IN AN INFORMATION HANDLING ENVIRONMENT
Author(s): L G BECKER
Date Published: 1979
Page Count: 14
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America
Language: English
Country: United States of America
Annotation: RISK ASSESSMENT MANAGEMENT IN AN INFORMATION HANDLING ENVIRONMENT, SUCH AS A BANK OR A LIBRARY IS DISCUSSED WITH RESPECT TO THE LEGISLATIVE AND REGULATORY FRAMEWORK AND OTHER CONSIDERATIONS.
Abstract: RISK ASSESSMENT'S GOAL IS TO UNDERSTAND VULNERABILITY AND INSTITUTE A SET OF VIABLE SAFEGUARDS. SUBSTANTIAL SUPPORT FROM HIGH-LEVEL MANAGEMENT, ALONG WITH PHILOSOPHICAL AND EMOTIONAL COMMITMENT, IS NEEDED FOR RISK ASSESSMENT. GOOD MANAGEMENT PRACTICES CAN NEGATE THE NEED FOR ADDITIONAL GOVERNMENT REGULATION AND CONTROL. IN SOME CASES, MANDATED PRIVACY SAFEGUARDS HAVE STRENGTHENED MANAGEMENT PRACTICES AND IMPROVED PRODUCTIVITY. THE 1974 PRIVACY ACT IS AN EXAMPLE. TWO MAJOR TRENDS AFFECTING RISK ASSESSMENT IN BOTH THE PUBLIC AND PRIVATE SECTORS HAVE EVOLVED. FIRST, THE TENDENCY TO GREATER OPENNESS AND ACCOUNTABILITY THROUGH SUCH LAWS AS THE FREEDOM OF INFORMATION ACT HAS REQUIRED BOTH ACCESS AND INSTITUTION OF PROPER CONTROLS. SECOND, CONCERN FOR PRIVACY AND SECURITY HAS PROMOTED PROTECTION OF ASSETS. THE 1978 RIGHT TO FINANCIAL PRIVACY ACT LIMITS GOVERNMENT ACCESS TO AN INDIVIDUAL'S FINANCIAL RECORDS AND REQUIRES DISCLOSURES OF INFORMATION GIVEN TO LAW ENFORCEMENT AGENCIES. THE AMENDED CONSUMER CREDIT PROTECTION ACT ESTABLISHES RIGHTS AND RESPONSIBILITIES OF PARTICIPANTS IN ELECTRONIC FUNDS TRANSFER SYSTEMS. THE 1977 FOREIGN CORRUPT PRACTICES ACT REQUIRES COMPREHENSIVE MONITORING OF PRIVATE ORGANIZATIONS' RESOURCES. RISK ASSESSMENT EFFORTS MUST CONSIDER TIME, TYPES OF PERSONNEL, RESOURCES, AND AN UNDERSTANDING OF THE ENVIRONMENT TO BE CREATED. A CONTROLLED ENVIRONMENT IS ESSENTIAL. TECHNICAL ADVANCES HAVE REVOLUTIONIZED COMMUNICATIONS AND INFORMATION HANDLING. THE TRENDS TOWARD OPENNESS AND ACCOUNTABILITY, INCREASED GOVERNMENT INVOLVEMENT, AND INCREASED RELIANCE ON TECHNOLOGY WILL ALL REQUIRE COORDINATION WITHIN ORGANIZATIONS TO MEET NEW COMPETITIVE FORCES. (CFW)
Index Term(s): Business security; Computer privacy and security; Confidential records access; Data security; Financial institutions; Records management
Note: PRESENTATION AT THE 1979 UCC FINANCIAL INDUSTRIES USERS CONFERENCE, AUGUST 22, 1979, SAN ANTONIO, TEXAS, CONVENTION CENTER.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=62935

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.