Page not found

×

Error message

The page you requested does not exist. For your convenience, a search was performed using the query s Data theft.
  1. The enemy within

    ... coverage of the MyDoom virus has got me worried about losing data stored on my computer. Is it a threat to my business? A. Without a ... Q. So my own staff could be misusing data? A. It’s a possibility. New technology makes the job of protecting business assets an ...

  2. The enemy within_2

    ... coverage of the MyDoom virus has got me worried about losing data stored on my computer. Is it a threat to my business? A. Without a ... Q. So my own staff could be misusing data? A. It’s a possibility. New technology makes the job of protecting business assets an ...

  3. Name, rank and serial number

    The Data Protection Act 1998 came into force in March 2000. The scope of this new ... data should be processed in accordance with the individual’s rights as laid down in the legislation • Appropriate security measures ... who have been damaged or suffered as a result of the theft. Enforcement of the Data Protection Act relies heavily on people ...

  4. UK staff 'can't be trusted'

    ... Penny Streeter, who was awarded an OBE in the New Year's honours list, was highly critical of 50 administrative staff she had ... in Sutton, Surrey. She also warned other recruiters that data theft was becoming endemic in the UK and said that agencies are ...

  5. Identity crisis_2

    ... very few businesses are not touched by fraud. “It’s not always bank details, but database and information fraud is a huge problem ... organisations. We’ve even seen instances where hospital data has become available.” Aside from the commercial damage caused by ...

  6. E-policy explored

    ... (unauthorised use or modification) • Sabotage of data or networks (malicious destruction, modification, removal) • ... and procedures have been established and that management's responsibility in this area is clearly defined'. Many automated hacking tools ...

  7. Insurance: Your temps, your fault

    Fri, 24 Apr 2015 | By Colin Cottell FROM MAY 2015'S RECRUITER MAGAZINE Hirers are increasingly insisting ... should an IT contractor supplied by the agency lose customer data, for example. The trend for pushing recruiters into signing these ...

  8. Special Report: Attack of the payroll clones

    ... to several umbrella companies with the same director’s name showed that something was not right,” said Smith, explaining that she ... be taking place but Charlotte Gerrish, a commercial law and data protection expert and founding lawyer of Gerrish Legal, explains that ...

  9. Online security guards

    ... found itself the unwelcome focus of recruitment’s latest internet attack, the incident generated more than its fair share of attention. On 22 August, news broke that data — names, addresses, phone numbers and email addresses — from 1.3m ...

  10. Do not relegate cyber security risks to IT, expert says

    ... the boardroom – and responsibility for managing risks to data, systems and competitively sensitive information should not be relegated ... Barker, cyber security “is not a technical issue – it’s a people issue”. Most breaches are caused by human error, she said. ...

Top