HOME
*





California Senate Bill 1386 (2002)
California S.B. 1386 was a bill passed by the California legislature that amended the California law regulating the privacy of personal information: civil codes 1798.29, 1798.82 and 1798.84. This was an early example of many future U.S. and international security breach notification laws, it was introduced by California State Senator Steve Peace on February 12, 2002, and became operative July 1, 2003. Sections Enactment of a requirement for notification to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. This requires an agency, person or business that conducts business in California and owns or licenses to computerized 'personal information,' to disclose any breach of security (to any resident whose unencrypted data is believed to have been disclosed). The bill mandates various mechanisms and procedures with respect to many aspects of this scenario, subject also to other defined ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

California Legislature
The California State Legislature is a bicameral state legislature consisting of a lower house, the California State Assembly, with 80 members; and an upper house, the California State Senate, with 40 members. Both houses of the Legislature convene at the California State Capitol in Sacramento. The California state legislature is one of just ten full-time state legislatures in the United States. The houses are distinguished by the colors of the carpet and trim of each house. The Senate is distinguished by red and the Assembly by the color green, inspired by the House of Lords and House of Commons respectively. The Democratic Party currently holds veto-proof supermajorities in both houses of the California State Legislature. The Assembly consists of 60 Democrats and 19 Republicans, with one independent, while the Senate is composed of 31 Democrats and 9 Republicans. Except for a brief period from 1995 to 1996, the Assembly has been in Democratic hands since the 1970 ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

California Law
The law of California consists of several levels, including constitutional, statutory, and regulatory law, as well as case law. The California Codes form the general statutory law, and most state agency regulations are available in the California Code of Regulations. Sources of law The Constitution of California is the foremost source of state law. Legislation is enacted within the California Statutes, which in turn have been codified into the 29 California Codes. State agencies promulgate regulations with the California Regulatory Notice Register, which are in turn codified in the California Code of Regulations. California's legal system is based on common law, which is interpreted by case law through the decisions of the Supreme Court of California, California Courts of Appeal, and Appellate Divisions of the Superior Courts of California, and published in the '' California Reports'', '' California Appellate Reports'', and ''California Appellate Reports Supplement'', r ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of appropriate use and protection of information. Privacy may also take the form of bodily integrity. The right not to be subjected to unsanctioned invasions of privacy by the government, corporations, or individuals is part of many countries' privacy laws, and in some cases, constitutions. The concept of universal individual privacy is a modern concept primarily associated with Western culture, particularly British and North American, and remained virtually unknown in some cultures until recent times. Now, most cultures recognize the ability of individuals to withhold certain parts of personal information from wider society. With the rise of technology, the debate regarding privacy has shifted from a bodily sense to a digital sense. As th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Personal Information
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates has four common variants based on ''personal'' or ''personally'', and ''identifiable'' or ''identifying''. Not all are equivalent, and for legal purposes the effective definitions vary depending on the jurisdiction and the purposes for which the term is being used. Under European and other data protection regimes, which centre primarily on the General Data Protection Regulation (GDPR), the term "personal data" is significantly broader, and determines the scope of the regulatory regime. National Institute of Standards and Technology Special Publication 800-122 defines personally identifiable information as "any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an i ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Security Breach Notification Laws
Security breach notification laws or data breach notification laws are laws that require individuals or entities affected by a data breach, unauthorized access to data, to notify their customers and other parties about the breach, as well as take specific steps to remedy the situation based on state legislature. Data breach notification laws have two main goals. The first goal is to allow individuals a chance to mitigate risks against data breaches. The second goal is to promote company incentive to strengthen data security.Together, these goals work to minimize consumer harm from data breaches, including impersonation, fraud, and identity theft. Such laws have been irregularly enacted in all 50 U.S. states since 2002. Currently, all 50 states have enacted forms of data breach notification laws. There is no federal data breach notification law, despite previous legislative attempts. These laws were enacted in response to an escalating number of breaches of consumer databases cont ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Stephen Peace
James Stephen Peace (born March 30, 1953) is an American writer, actor, and producer, best known for the ''Attack of the Killer Tomatoes!'' film series. A politician belonging to the Democratic Party, Peace served in the California State Assembly from 1982–1992 and in the California State Senate from 1993–2002. Early life and education James Stephen Peace was born in San Diego, California to two teachers. He attended Bonita Vista High School, where he played football and basketball and was president of the student body. He attended the University of California, Davis and the University of California, San Diego, majoring in political science. Career Film Peace's film credits include the ''Killer Tomatoes'' cult series: ''Attack of the Killer Tomatoes!'' (actor, producer, writer), '' Return of the Killer Tomatoes!'' (actor, producer, writer), '' Killer Tomatoes Strike Back'' (actor, producer), and '' Killer Tomatoes Eat France'' (producer, writer). He also produced, wr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Minimum Contacts
Minimum contacts is a term used in the United States law of civil procedure to determine when it is appropriate for a court in one state to assert personal jurisdiction over a defendant from another state. The United States Supreme Court has decided a number of cases that have established and refined the principle that it is unfair for a court to assert jurisdiction over a party unless that party's contacts with the state in which that court sits are such that the party "could reasonably expect to be haled into court" in that state. This jurisdiction must "not offend traditional notions of fair play and substantial justice". A non-resident defendant may have minimum contacts with the forum state if they 1) have direct contact with the state; 2) have a contract with a resident of the state; 3) have placed their product into the stream of commerce such that it reaches the forum state; 4) seek to serve residents of the forum state; 5) have satisfied the Calder effects test; or 6) have a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Shaffer V
Schaefer is an alternative spelling and cognate for the German word ''schäfer'', meaning 'shepherd', which itself descends from the Old High German '' scāphare''. Variants "Shaefer", "Schäfer" (a standardized spelling in many German-speaking countries after 1880), the additional alternative spelling "Schäffer", and the anglicised forms "Schaeffer", "Schaffer", "Shaffer", "Shafer", and "Schafer" are all common surnames. Schaefer ;Born in 1800–1899 * Arnold Schaefer (1819–1883), German historian *Germany Schaefer (1877–1919), American professional baseball player *Jacob Schaefer Sr (1850–1910), American professional billiards player *Jacob Schaefer Jr (1894–1975) American professional billiards player * Jacob Schaefer (composer) (1888–1936), American Jewish composer and conductor * Marie Charlotte Schaefer (1874-1927), American physician * Rudolph Jay Schaefer I (1863–1923), American businessman ;Born in 1900–1949 *Walter V. Schaefer (1904-1986), American j ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computing Legislation
Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, engineering, mathematical, technological and social aspects. Major computing disciplines include computer engineering, computer science, cybersecurity, data science, information systems, information technology and software engineering. The term "computing" is also synonymous with counting and calculating. In earlier times, it was used in reference to the action performed by mechanical computing machines, and before that, to human computers. History The history of computing is longer than the history of computing hardware and includes the history of methods intended for pen and paper (or for chalk and slate) with or without the aid of tables. Computing is intimately tied to the representation of numbers, though mathematical concepts ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Information Privacy
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection. Data privacy is challenging since attempts to use data while protecting an individual's privacy preferences and personally identifiable information. The fields of computer security, data security, and information security all design and use software, hardware, and human resources to address this issue. Authorities Laws Authorities by country Information types Various types of personal information often come under privacy concerns. Cable television This describes the ability to control what information one reveals about oneself over cable television, and who can access that information. For example, third parties can track IP TV programs someone has watched at any given time. "The addition of any infor ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]