The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2009 vol.11)
pp: 56-59
David K. Larson , University of Illinois at Springfield
Keith W. Miller , University of Illinois at Springfield
ABSTRACT
When a business traveler carries sensitive data, ethical, legal, and logistical problems can become problematic. Organizations, their employees, and government agents all have important duties with respect to this information if and when it's seized at the border. These competing duties are complex and difficult. The authors suggest that avoiding this situation altogether is the best option.
INDEX TERMS
information security, ethics, law, IT professional
CITATION
David K. Larson, Keith W. Miller, "When Sensitive IT Information Crosses Borders", IT Professional, vol.11, no. 4, pp. 56-59, July/August 2009, doi:10.1109/MITP.2009.85
REFERENCES
1. S. Karas, "U.S. Court OKs Border Laptop Searches," Canadian HR Reporter, vol. 20, no. 1, 2007, p. 5.
2. S. Boukhonine, V. Krotov, and B. Rupert, "Future Security Approaches and Biometrics," Comm. Assoc. for Information Systems, vol. 16, 2005, pp. 937–966.
3. T. Kayworth, L. Brocato, and D. Whitten, "What Is a Chief Privacy Officer? An Analysis Based on Mintzberg's Taxonomy of Managerial Roles," Comm. Assoc. for Information Systems, vol. 16, 2005, pp. 110–126.
4. M. McKee, "9th Circuit OKs Border Guards' Search of Traveler's Laptop," The Recorder,22 Apr. 2008; www.law.com/jsparticle.jsp?id=1208774513920&rss=newswire .
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool