This paper defines data protection as “the principles and processes for protecting data from corruption, misapplication, compromise, misuse, and loss.” Data protection leverages evolving technology and emerging practices to focus on how to apply the three critical information security imperatives: confidentiality, integrity, and availability.
BiographyGeoff Nathan is a faculty member in the Linguistics Program at Wayne State University, but also serves as Faculty Liaison to Wayne States Computing and Information Technology Division. In that role he serves on the Leadership Team, advising on policy issues and representing the academic users. In addition he is coordinating a Security assessment of Waynes information technology systems and also serves as chair of the Teaching, Learning and Technology Roundtable. He came to Wayne in 2002 from Southern Illinois University at Carbondale, where he served as chair of the Computing Advisory Committee for several years, and helped develop SIUCs Strategic Plan for Computing. He holds a PhD in Linguistics from the University of Hawai`i and his area of research is phonetics and phonology.
If you’re searching for something sensitive online, be sure to use a private browsing option to protect your privacy. Targeted ads are everywhere and you may find them popping up at the most inopportune times.