Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Michael R. Overly, James R. Kalyvas
Big Data
Dedications
Disclaimer
Why We Wrote This Book
Acknowledgments
About the Authors
Contributors
Chapter 1 - A Big Data Primer for Executives
1.1 What Is Big Data?
1.1.1 Characteristics of Big Data
1.1.2 Volume
1.1.3 The Internet of Things and Volume
1.1.4 Variety
1.1.5 Velocity
1.1.6 Validation
1.2. Cross-Disciplinary Approach, New Skills, and Investment
1.3 Acquiring Relevant Data
1.4 The Basics of How Big Data Technology Works
1.5 Summary
Notes
Chapter 2 - Overview of Information Security and Compliance: Seeing the Forest for the Trees
2.1 Introduction
2.2 What Kind of Data Should Be Protected?
2.3 Why Protections Are Important
2.4 Common Misconceptions about Information Security Compliance
2.5 Finding Common Threads in Compliance Laws and Regulations
2.6 Conclusion
Note
Chapter 3 - Information Security in Vendor and Business Partner Relationships
3.1 Introduction
3.2 Chapter Overview
3.3 The First Tool: A Due Diligence Questionnaire
3.4 The Second Tool: Key Contractual Protections
3.4.1 Warranties
3.4.2 Specific Information Security Obligations
3.4.3 Indemnity
3.4.4 Limitation of Liability
3.4.5 Confidentiality
3.4.6 Audit Rights
3.5 The Third Tool: An Information Security Requirements Exhibit
3.6 Conclusion
Chapter 4 - Privacy and Big Data
4.1 Introduction
4.2 Privacy Laws, Regulations, and Principles That Have an Impact on Big Data
4.3 The Foundations of Privacy Compliance
4.4 Notice
4.5 Choice
4.6 Access
4.7 Fair Credit Reporting Act
4.8 Consumer Reports
4.9 Increased Scrutiny from the FTC
4.10 Implications for Businesses
4.11 Monetizing Personal Information: Are You a Data Broker?
4.12 The FTC’s Reclaim Your Name Initiative
4.13 Deidentification
4.14 Online Behavioral Advertising
4.15 Best Practices for Achieving Privacy Compliance for Big Data Initiatives
4.16 Data Flow Mapping Illustration
Notes
Chapter 5 - Federal and State Data Privacy Laws and Their Implications for the Creation and Use of Health Information Databases
5.1 Introduction
5.2 Chapter Overview
5.3 Key Considerations Related to Sources and Types of Data
5.4 PHI Collected from Covered Entities without Individual Authorization
5.4.1 Analysis for Covered Entities’ Health Care Operations
5.4.2 Creation and Use of Deidentified Data
5.4.3 Strategies for Aggregation and Deidentification of PHI by Business Associates
5.4.4 Marketing and Sale of PHI
5.4.5 Creation of Research Databases for Future Research Uses of PHI
5.4.6 Sensitive Information
5.5 Big Data Collected from Individuals
5.5.1 Personal Health Records
5.5.2 Mobile Technologies and Web-Based Applications
5.5.3 Conclusion
5.6 State Laws Limiting Further Disclosures of Health Information
5.6.1 State Law Restrictions Generally
5.6.2 Genetic Data: Informed Consent and Data Ownership
5.7 Conclusion
Notes
Chapter 6 - Big Data and Risk Assessment
6.1 Introduction
6.2 What Is the Strategic Purpose for the Use of Big Data?
6.3 How Does the Use of Big Data Have an Impact on the Market?
6.4 Does the Use of Big Data Result in Injury or Damage?
6.5 Does the Use of Big Data Analysis Have an Impact on Health Issues?
6.6 The Impact of Big Data on Discovery
Notes
Chapter 7 - Licensing Big Data
7.1 Overview
7.2 Protection of the Data/Database under Intellectual Property Law
7.2.1 Copyright
7.2.2 Trade Secrets
7.2.3 Contractual Protections for Big Data
7.3 Ownership Rights
7.4 License Grant
7.5 Anonymization
7.6 Confidentiality
7.7 Salting the Database
7.8 Termination
7.9 Fees/Royalties
7.9.1 Revenue Models
7.9.2 Price Protection
7.10 Audit
7.11 Warranty
7.12 Indemnification
7.13 Limitation of Liability
7.14 Conclusion
Notes
Chapter 8 - The Antitrust Laws and Big Data
8.1 Introduction
8.2 Overview of the Antitrust Laws
8.3 Big Data and Price-Fixing
8.4 Price-Fixing Risks
8.5 “Signaling” Risks
8.6 Steps to Reduce Price-Fixing and Signaling Risks
8.7 Information-Sharing Risks
8.8 Data Privacy and Security Policies as Facets of Nonprice Competition
8.9 Price Discrimination and the Robinson–Patman Act
8.10 Conclusion
Notes
Chapter 9 - The Impact of Big Data on Insureds, Insurance Coverage, and Insurers
9.1 Introduction
9.2 The Risks of Big Data
9.3 Traditional Insurance Likely Contains Significant Coverage Gaps for the Risks Posed by Big Data
9.4 Cyber Liability Insurance Coverage for the Risks Posed by Big Data
9.5 Considerations in the Purchase of Cyber Insurance Protection
9.6 Issues Related to Cyber Liability Insurance Coverage
9.7 The Use of Big Data by Insurers
9.8 Underwriting, Discounts, and the Trade Practices Act
9.9 The Privacy Act
9.10 Access to Personal Information
9.11 Correction of Personal Information
9.12 Disclosure of the Basis for Adverse Underwriting Decisions
9.13 Third-Party Data and the Privacy Act
9.14 The Privacy Regulation
9.15 Conclusion
Notes
Chapter 10 - Using Big Data to Manage Human Resources
10.1 Introduction
10.2 Using Big Data to Manage People
10.2.1 Absenteeism and Scheduling
10.2.2 Identifying Attributes of Success for Various Roles
10.2.3 Leading Change
10.2.4 Managing Employee Fraud
10.3 Regulating the Use of Big Data in Human Resource Management
10.4 Antidiscrimination under Title VII
10.5 The Genetic Information and Nondiscrimination Act of 2007
10.6 National Labor Relations Act
10.7 Fair Credit Reporting Act
10.8 State and Local Laws
10.9 Conclusion
Notes
Chapter 11 - Big Data Discovery
11.1 Introduction
11.2 Big Data, Big Preservation Problems
11.3 Big Data Preservation
11.3.1 The Duty to Preserve: A Time-Tested Legal Doctrine Meets Big Data
11.3.2 Avoiding Preservation Pitfalls
11.3.2.1 Failure to Flip the Off Switch
11.3.2.2 The Spreadsheet Error
11.3.2.3 The Never-Ending Hold
11.3.2.4 The Fire and Forget
11.3.2.5 Deputizing Custodians as Information Technology Personnel
11.3.3 Pulling the Litigation Hold Trigger
11.3.4 Big Data Preservation Triggers
11.4 Big Database Discovery
11.4.1 The Database Difference
11.4.2 Databases in Litigation
11.4.3 Cooperate Where You Can
11.4.4 Object to Unreasonable Demands
11.4.5 Be Specific
11.4.6 Talk about Database Discovery Early in the Process
11.5 Big Data Digging
11.5.1 Driving the CAR Process
11.5.2 The Clawback
11.6 Judicial Acceptance of CAR Methods
11.7 Conclusion
Notes
Glossary
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Preliminaries
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset