Serveur d'exploration sur l'OCR

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Offshore Outsourcing - How Safe is Your Data Abroad? Overview of Privacy, Data Protection and Security

Identifieur interne : 000456 ( Main/Exploration ); précédent : 000455; suivant : 000457

Offshore Outsourcing - How Safe is Your Data Abroad? Overview of Privacy, Data Protection and Security

Auteurs : Subhajit Basu [Royaume-Uni] ; Amruta Nikam

Source :

RBID : ISTEX:4CDD5394EB2FD8F87117B5AF30C0D54B4BEE6563

Abstract

Outsourcing arrangements often involve cross-border transfers of indeterminately large proportions of a client's proprietary and confidential information assets. An increasing number of companies from developing countries is contracting with financial institutions, hospitals, and insurance companies to do their back office jobs. In most cases these companies deal with sensitive information, such as financial data, medical data, payroll and benefits information, social security numbers and purchasing histories. Virtually any outsourced business process may involve privacy violations arising from mistakes or negligence. In light of these developments, this paper examines the "other side" of outsourcing and identifies its paradoxical and adverse effects. Further based on a thorough analysis of privacy law the paper also determine the risk to privacy and data security posed by the 'offshore outsourcing' and strategies employed by institutions and regulators to identify, measure, monitor, and control the risk to personal data.

Url:
DOI: 10.2202/1535-167X.1204


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Offshore Outsourcing - How Safe is Your Data Abroad? Overview of Privacy, Data Protection and Security</title>
<author>
<name sortKey="Basu, Subhajit" sort="Basu, Subhajit" uniqKey="Basu S" first="Subhajit" last="Basu">Subhajit Basu</name>
</author>
<author>
<name sortKey="Nikam, Amruta" sort="Nikam, Amruta" uniqKey="Nikam A" first="Amruta" last="Nikam">Amruta Nikam</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:4CDD5394EB2FD8F87117B5AF30C0D54B4BEE6563</idno>
<date when="2011" year="2011">2011</date>
<idno type="doi">10.2202/1535-167X.1204</idno>
<idno type="url">https://api.istex.fr/document/4CDD5394EB2FD8F87117B5AF30C0D54B4BEE6563/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001657</idno>
<idno type="wicri:Area/Istex/Curation">001564</idno>
<idno type="wicri:Area/Istex/Checkpoint">000113</idno>
<idno type="wicri:Area/Main/Merge">000462</idno>
<idno type="wicri:Area/Main/Curation">000456</idno>
<idno type="wicri:Area/Main/Exploration">000456</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Offshore Outsourcing - How Safe is Your Data Abroad? Overview of Privacy, Data Protection and Security</title>
<author>
<name sortKey="Basu, Subhajit" sort="Basu, Subhajit" uniqKey="Basu S" first="Subhajit" last="Basu">Subhajit Basu</name>
<affiliation wicri:level="1">
<country wicri:rule="url">Royaume-Uni</country>
<wicri:regionArea>Queen’s University Belfast</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Royaume-Uni</country>
</affiliation>
</author>
<author>
<name sortKey="Nikam, Amruta" sort="Nikam, Amruta" uniqKey="Nikam A" first="Amruta" last="Nikam">Amruta Nikam</name>
<affiliation>
<wicri:noCountry code="subField">amrutanikam1@hotmail.com</wicri:noCountry>
</affiliation>
<affiliation>
<wicri:noCountry code="no comma">E-mail: amrutanikam1@hotmail.com</wicri:noCountry>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Global Jurist Topics</title>
<idno type="eISSN">1535-167X</idno>
<imprint>
<publisher>De Gruyter</publisher>
<date type="published" when="2006-09-09">2006-09-09</date>
<biblScope unit="volume">6</biblScope>
<biblScope unit="issue">2</biblScope>
</imprint>
</series>
<idno type="istex">4CDD5394EB2FD8F87117B5AF30C0D54B4BEE6563</idno>
<idno type="DOI">10.2202/1535-167X.1204</idno>
<idno type="ArticleID">1535-167X.1204</idno>
<idno type="Related-article-Href">gj.2006.6.2.1204.pdf</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Outsourcing arrangements often involve cross-border transfers of indeterminately large proportions of a client's proprietary and confidential information assets. An increasing number of companies from developing countries is contracting with financial institutions, hospitals, and insurance companies to do their back office jobs. In most cases these companies deal with sensitive information, such as financial data, medical data, payroll and benefits information, social security numbers and purchasing histories. Virtually any outsourced business process may involve privacy violations arising from mistakes or negligence. In light of these developments, this paper examines the "other side" of outsourcing and identifies its paradoxical and adverse effects. Further based on a thorough analysis of privacy law the paper also determine the risk to privacy and data security posed by the 'offshore outsourcing' and strategies employed by institutions and regulators to identify, measure, monitor, and control the risk to personal data.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Royaume-Uni</li>
</country>
</list>
<tree>
<noCountry>
<name sortKey="Nikam, Amruta" sort="Nikam, Amruta" uniqKey="Nikam A" first="Amruta" last="Nikam">Amruta Nikam</name>
</noCountry>
<country name="Royaume-Uni">
<noRegion>
<name sortKey="Basu, Subhajit" sort="Basu, Subhajit" uniqKey="Basu S" first="Subhajit" last="Basu">Subhajit Basu</name>
</noRegion>
<name sortKey="Basu, Subhajit" sort="Basu, Subhajit" uniqKey="Basu S" first="Subhajit" last="Basu">Subhajit Basu</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/OcrV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000456 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000456 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    OcrV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:4CDD5394EB2FD8F87117B5AF30C0D54B4BEE6563
   |texte=   Offshore Outsourcing - How Safe is Your Data Abroad? Overview of Privacy, Data Protection and Security
}}

Wicri

This area was generated with Dilib version V0.6.32.
Data generation: Sat Nov 11 16:53:45 2017. Site generation: Mon Mar 11 23:15:16 2024