17.07.2015 Views

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

Download eBook (PDF) - Red Gate Software

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of ContentsAbout the Author ........................................................................ xiiAcknowledgements .................................................................... xiiiIntroduction .................................................................................xivRules, Regulations and Responsibility .......................................... xivOvercoming Encryptionphobia ...................................................... xvWhat this Book covers .................................................................. xviiCode <strong>Download</strong> ............................................................................. xviiiFeedback ....................................................................................... xviiiChapter 1: Understanding Sensitive Data ................................. 19What Makes Data Sensitive? .......................................................... 19Personal, Identifiable and Sensitive Data ..................................... 19Implications of Data Theft ........................................................... 21Compliance with Regulations ...................................................... 23Types of Sensitive Data ................................................................... 24Government Assigned Identification ............................................ 24Biometric Data ............................................................................. 25Medical Data and History ............................................................ 26Student Education Data ................................................................ 27Employment Records ................................................................... 28Communication Data ................................................................... 29Financial Data .............................................................................. 30Trade Secrets ................................................................................ 31Group Dynamics of Sensitive Data ................................................ 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!