Confidential Data in UK Law

  • Criminal infiltration of financial institutions: a penetration test case study
    • Núm. 13-1, Enero 2010
    • Journal of Money Laundering Control
    • 55-65
    Purpose: The purpose of this paper is to discuss the findings of a security research project commissioned by a financial institution to identify security breaches that could facilitate illicit acce...
    ...... techniques to generateopportunities to steal confidential data, the project simulates a possible criminal attack.Findings – The ......
  • External reactive detection v. internal proactive prevention. The holistic approach to integrate change
    • Núm. 20-3, Julio 2013
    • Journal of Financial Crime
    • 287-292
    Purpose: All members of staff up to the Chairman of the Board now get daily briefings of the serious issues within the financial sector. Headlines are commonly quoting regulatory fines, once in the...
    ...... media reports, and is not confirmed by any confidential dataknown to the author.Originality/value – Using case analysis and field work, ......
  • Financial services in trouble: the electronic dimension
    • Núm. 16-2, Mayo 2009
    • Journal of Financial Crime
    • 180-192
    Purpose: The initial role of computers and information technology (IT) systems consisted of improving business daily's operation. However, this quest of efficiency serves more obscure goals as frau...
    ...... media and books) and is not confirmed by any confidential dataavailable to the author.Originality/value – Many computer crime experts (re: ......
  • User privacy in the digital library environment: an investigation of policies and preparedness
    • Núm. 24-1/2, Febrero 2003
    • Library Management
    • 44-50
    With digital technology libraries can archive considerable resources of detailed information about their users. This data is generally regarded as confidential between the library and the individua...
    ......DataprotectionAbstractWithdigitaltechnologylibrariescanarchiveconsiderableresourcesofdetailedinformationabouttheirusers... a commitmentto services in digital form may hold manytypes of confidential personal data. Theyinclude: membership files, records of loans ......
  • A coordinated response to the high drug death rate in Brighton & Hove
    • Núm. 53-3, Septiembre 2006
    • Probation Journal
    Concern about the increasing number of drug related deaths in Brighton & Hove prompted a Confidential Inquiry into 69 deaths. This led to recommendations concern...
    ......This led to recommendations concerning better data collection, identifying vulnerable popu- lations, improving responses to ......
  • Lone terrorists: A study of run-over attacks in Israel
    • Núm. 16-1, Enero 2019
    • European Journal of Criminology
    There is agreement amongst scholars regarding the lack of a unique profile for lone wolf actor terrorists. Therefore, this study focuses on the characteristics of the lone attack, which has rarely ...
    ......Data for this study were obtained from confidential and open sources. The ......
  • Investigating homicide offender typologies based on their clinical histories and crime scene behaviour patterns
    • Núm. 5-3, Septiembre 2019
    • Journal of Criminological Research, Policy and Practice
    • 168-188
    Purpose: The purpose of this paper is to identify offender typologies based on aspects of the offenders’ psychopathology and their associations with crime scene behaviours using data derived from t...
    ...... and their associations with crime scene behaviours using data derivedfrom the National Confi dential Enquiry into Su icide and Safety in ... clinical historyinformation were obtained from the National Confidential Enquiry into Suicide and Safety inMental Health (NCISH). NCISH collect and ......
  • The influence of third party to the effectiveness of commercial crime investigation
    • Núm. 21-3, Julio 2018
    • Journal of Money Laundering Control
    • 414-425
    Purpose: The purpose of this paper is to examine the problems that are related to the witness and acquisition of evidence during the commercial crime investigation. Design/methodology/approach: Da...
    ...... the commercial crime investigation.Design/methodology/approach –Data for this research were collected primarily from the semi-structured ......
  • Hold on to footloose handhelds.
    • Núm. 2001, Enero 2001
    • Financial Management (UK)
    • Handheld computers - Brief Article
    ...... people are using laptops and handhelds to store valuable and confidential data which if lost or stolen can put a company at serious risk of ......
  • Coming out in the wash: the US government has published research on the global anti-money-laundering campaign in 2008. It shows that there's a long way to go, according to Martin Nimmo, who reveals some of the highlights.
    • Núm. 2009, Marzo - Mayo 2009
    • Financial Management (UK)
    • Nimmo, Martin
    • Opinion
    ......As a result, eight agents were charged with leaking confidential data to drug cartels. . * In Indonesia the scale of the terrorist threat ......
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT