Collaborative Privacy and Security Programs and the Symbiosis They Can Create
Abstract
The value of business and human information has increased exponentially, and those who steal and defraud have become more creative and savvy. In our electronic world, machines conduct transactions without regard to the authenticity of the purported human seeking the transaction. Not that long ago, banking customers would drive to their banks, meet with tellers (often recognizing each other), and present a paper form with a photo identification to conduct business. Not that long ago, computers in banks and other financial institutions, universities, hospitals, law firms, and other businesses were large machines in a server room that were connected to each other, but not connected to a wide variety of computers outside the organization. Privacy laws were originally written in light of the conduct of business and human interaction within that model.