WorldCat Identities

Stevens, Gina Marie

Overview
Works: 31 works in 92 publications in 1 language and 888 library holdings
Roles: Author
Classifications: JK1108, 342.730858
Publication Timeline
.
Most widely held works by Gina Marie Stevens
Privacy : wiretapping and electronic eavesdropping by Gina Marie Stevens( Book )

10 editions published between 2001 and 2012 in English and held by 180 WorldCat member libraries worldwide

"It is a federal crime to intentionally wiretap or electronically eavesdrop on the conversation of another without a court order or the consent of one of the parties to the conversation. Moreover, in eleven states, it is a state crime for anyone other than the police to intentionally wiretap and/or electronically eavesdrop on the conversation of another without the consent of all of the parties to the conversation. The federal crimes are punishable by imprisonment for up to five years and expose offenders to civil liability for damages, attorneys' fees, and possibly punitive damages. State crimes carry similar consequences. Even in states where one party consent interceptions are legal, they may well be contrary to the professional obligations of members of the bar. The proscriptions often include a ban on using or disclosing the fruits of an illegal interception."--Page 1
Privacy : total information awareness programs and latest developments by Gina Marie Stevens( Book )

5 editions published in 2003 in English and held by 101 WorldCat member libraries worldwide

This report describes the Total Information Awareness (TIA) programs in the Defense Research Projects Agency (DARPA) of the Department of Defense, and related information access, collection, and protection laws. TIA is a new technology under development that plans to use data mining technologies to sift through personal transactions in electronic data to find patterns and associations connected to terrorist threats and activities. Data mining technologies are currently used by federal agencies for various purposes. DARPA has underway a five year research project to develop and integrate information technologies into prototype systems to identify foreign terrorists for use by the intelligence, counterintelligence, law enforcement, and homeland security communities. Recent increased awareness about the existence of the TIA project provoked expressions of concern about the potential for the invasion of privacy of law-abiding citizens by the Government, and about the direction of the project by John Poindexter, a central figure in the Iran-Contra affair. While the law enforcement and intelligence communities argue that more sophisticated information gathering techniques are essential to combat today's sophisticated terrorists, civil libertarians worry that the Government's increased capability to assemble information will result in increased and unchecked government power, and the erosion of individual privacy. A coalition of public interest groups has asked Congress to intervene
A brief summary of the medical privacy rule by Gina Marie Stevens( Book )

10 editions published between 2002 and 2003 in English and held by 100 WorldCat member libraries worldwide

Online privacy protection issues and developments by Gina Marie Stevens( Book )

5 editions published between 1999 and 2001 in English and held by 59 WorldCat member libraries worldwide

It is routinely acknowledged that the success of the Internet and electronic commerce depends upon the resolution of issues related to the privacy of online personal information. This paper discusses some potential threats to the privacy of online personal information, and efforts by businesses, governments, and citizens to respond to them. The paper also provides an overview of the legal framework for the protection of personal information. The Constitution protects the privacy of personal information in a limited number of ways, and extends only to the protection of the individual against government intrusions. Any limitations placed on the data processing activities of the private sector will be found not in the Constitution but in federal or state law. With the exception of the Children's Online Privacy Protection Act of 1998, none of these laws specifically covers the collection of online personal information. The Commission issued a report to Congress in July 1999 on Self-Regulation and Online Privacy and found that the vast majority of the sites surveyed collect personal information from consumers online, and that the implementation of fair information practices is not widespread. The FTC issued a new report in May 2000 after another survey of web sites. Notwithstanding measurable gains since the 1999 report to Congress, a majority of the Commission found that self-regulation alone, without some legislation, is unlikely to provide online consumers with the level of protection they seek and deserve, and recommended that Congress consider legislation to complement self-regulation
Critical infrastructure information disclosure and homeland security by John D Moteff( Book )

6 editions published between 2002 and 2003 in English and held by 51 WorldCat member libraries worldwide

One of the findings of the President's Commission on Critical Infrastructure Protection, established by President Clinton in 1996, was the need for the federal government and owners and operators of the nation's critical infrastructures to share information on vulnerabilities and threats. Among the strategies to help owners and operators share information with the federal government was a proposal to exempt the information they share from disclosure under the Freedom of Information Act (FOIA). Three of the nine exemptions provide possible protection against the release of critical infrastructure information: exemption 1 (national security information); exemption 3 (information exempted by statute); and exemption 4 (confidential business information). Public interest groups argue that the language in the House bill is far too broad and would allow a wide range of information to be protected from disclosure (including information previously available under FOIA), and that existing FOIA exemptions and case law provide sufficient protections
Data security federal legislative approaches by Gina Marie Stevens( Book )

9 editions published between 2006 and 2008 in English and held by 35 WorldCat member libraries worldwide

Numerous data security bills were introduced in the first session of the 109th Congress to address data security breaches; some of these bills preempt and sometimes limit recently enacted state laws. Three congressional hearings were held in 2005 to examine issues related to data breaches. Three bills were reported by Senate committees during the first session of the 109th Congress. The prospect for continued congressional attention is high during the second session of the 109th Congress, with eight congressional committees having jurisdiction over some aspect of data security, data breach notification, and data privacy. This report discusses the core areas addressed in federal legislation, including the scope of coverage (who is covered and what information is covered); data privacy and security safeguards for sensitive personal information; requirements for security breach notification (when, how, triggers, frequency, and exceptions); restrictions on social security numbers (collection, use, and sale); credit freezes on consumer reports; identity theft penalties; causes of action; and preemption. For related reports, see CRS Report RS22374, Data Security: Federal and State Laws, by Gina Marie Stevens; CRS Report RL33005, Information Brokers: Federal and State Laws, by Angie A. Welborn; CRS Report RS20185, Privacy Protection for Customer Financial Information, by M. Maureen Murphy; and CRS Report RL31408, Internet Privacy: Overview and Pending Legislation, by Marcia S. Smith. This report will be updated as warranted
Data security federal and state laws by Gina Marie Stevens( Book )

5 editions published between 2006 and 2007 in English and held by 30 WorldCat member libraries worldwide

Security breaches involving electronic personal data have come to light largely as a result of the California Security Breach Notification Act, a California notification law that went into effect in 2003. In response, the states and some Members have introduced bills that would require companies to notify persons affected by such security breaches. By December 2005, 35 states had introduced data security legislation and 22 states had enacted data security laws. Numerous data security bills have been introduced in the 109th Congress (S. 115, S. 500, S. 751, S. 768, S. 1216, S. 1326, S. 1332, S. 1408, S. 1594, S. 1789, S. 2169, H.R. 1069, H.R. 1080, H.R. 3140, H.R. 3374, H.R. 3375, H.R. 3397, H.R. 4127). S. 1326, S. 1408, and S. 1789 were reported by Senate committees. This report provides a brief discussion of federal and state data security laws
Data brokers background and industry overview by Gina Marie Stevens( Book )

4 editions published in 2007 in English and held by 29 WorldCat member libraries worldwide

Sex-based employment discrimination UAW v. Johnson Controls, Inc. by Gina Marie Stevens( Book )

1 edition published in 1991 in English and held by 21 WorldCat member libraries worldwide

Legal overview of grandparent visitation rights by Gina Marie Stevens( Book )

1 edition published in 1991 in English and held by 20 WorldCat member libraries worldwide

Foster care and federal law significant developments and continuing issues by Gina Marie Stevens( Book )

1 edition published in 1991 in English and held by 20 WorldCat member libraries worldwide

Child abuse and neglect fatalities federal and state issues and responses by Dale H Robinson( Book )

1 edition published in 1992 in English and held by 19 WorldCat member libraries worldwide

Remedies available to victims of identity theft by Gina Marie Stevens( Book )

2 editions published in 2007 in English and held by 15 WorldCat member libraries worldwide

Information security and data breach notification safeguards by Gina Marie Stevens( Book )

2 editions published in 2007 in English and held by 14 WorldCat member libraries worldwide

Information security and breach notification requirements are imposed on some entities that own, possess, or license sensitive personal information. Information security standards are designed to protect personally identifiable information from compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or other situations where unauthorized persons have access or potential access to personally identifiable information for unauthorized purposes. Data breach notification requirements obligate covered entities to provide notice to affected persons (e.g., cardholders, customers) about the occurrence of a data security breach involving personally identifiable information. The first data breach notification law was enacted in 2002-- S.B. 1386, the California Security Breach Notification Act. It requires any state agency, person, or business that owns or licenses computerized personal information to disclose any breach of a resident's personal information. S.B. 1386 was the model for subsequent data breach notification laws enacted by many states and Congress. California's law and other similar federal and state laws require the disclosure of security breaches of personal information. Major data security breaches have been disclosed by the nation's largest information brokerage firms, retailers, companies, universities, and government agencies. From February 2005 to December 2006, 100 million personal records were reportedly lost or exposed. Massive data security breaches in 2005, 2006, and 2007 have heightened interest in the security of personal information; in the business and regulation of data brokers; in the liability of retailers, credit card issuers, payment processors, banks, and furnishers of credit reports for third party companies costs arising from data breaches; and in remedies available to individuals whose personal information was accessed without authorization
Enforcement of the HIPAA privacy rule by Gina Marie Stevens( Book )

3 editions published in 2007 in English and held by 14 WorldCat member libraries worldwide

Government access to phone calling activity and related records : legal authorities by Elizabeth B Bazan( Book )

3 editions published in 2006 in English and held by 8 WorldCat member libraries worldwide

A Congressional Research Service (CRS) report for Congress: "This report will summarize statutory authorities regarding access by the Government, for either foreign intelligence or law enforcement purposes, to information related to telephone calling patterns or practices. Where pertinent, we will also discuss statutory prohibitions against accessing or disclosing such information, along with relevant exceptions to those prohibitions."
Federal information security and data breach notification laws by Gina Marie Stevens( Book )

4 editions published between 2008 and 2010 in English and held by 2 WorldCat member libraries worldwide

The following report describes information security and data breach notification requirements included in the Privacy Act, the Federal Information Security Management Act, Office of Management and Budget Guidance, the Veterans Affairs Information Security Act, the Health Insurance Portability and Accountability Act, the Gramm-Leach-Bliley Act, the Federal Trade Commission Act, and the Fair Credit Reporting Act. Also included in this report is a brief summary of the Payment Card Industry Data Security Standard (PCI DSS), an industry regulation developed by VISA, MasterCard, and other bank card distributors. Information security laws are designed to protect personally identifiable information from compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or other situations where unauthorized persons have access or potential access to personally identifiable information for unauthorized purposes. Data breach notification laws typically require covered entities to implement a breach notification policy, and include requirements for incident reporting and handling and external breach notification. During the 110th Congress, three data security bills--S. 239 (Feinstein), S. 495 (Leahy), and S. 1178 (Inouye)--were reported favorably out of Senate committees. Those bills include information security and data breach notification requirements. Several other data security bills were also introduced. The 109th and 110th Congresses did not pass data security legislation. In the 111th Congress, expectations are that efforts to move data security legislation will continue this year
Hurricane Katrina : HIPAA privacy and electronic health records of evacuees by Gina Marie Stevens( Book )

2 editions published between 2005 and 2006 in English and held by 0 WorldCat member libraries worldwide

"On September 4th, 2005 Health and Human Services (HHS) Secretary Leavitt declared a federal public health emergency for Louisiana, Alabama, Mississippi, Florida and Texas, and waived certain requirements under Medicare, Medicaid, the State Children's Health Insurance Program, and the Health Insurance Portability and Accountability Act (HIPAA) to allow health care providers in affected areas to care for patients without violating certain provisions of those laws. The Secretary waived sanctions and penalties arising from noncompliance with certain provisions of the HIPAA privacy regulations."--Page 1
Homeland Security Act of 2002 : Critical Infrastructure Information Act by Gina Marie Stevens( )

1 edition published in 2003 in English and held by 0 WorldCat member libraries worldwide

The Critical Infrastructure Information Act of 2002 ("CIIA"), to be codified at 6 U.S.C. 131 - 134, was passed on November 25, 2002 as subtitle B of Title II of the Homeland Security Act (P.L. 107-296, 116 Stat. 2135, sections 211 - 215), and regulates the use and disclosure of information submitted to the Department of Homeland Security (DHS) about vulnerabilities and threats to critical infrastructure. This report examines the CIIA. For further information, see CRS Report RL30153, "Critical Infrastructures: Background, Policy, and Implementation," by John Moteff. This report will be updated as warranted
Privacy protection for online information by Gina Marie Stevens( )

1 edition published in 2002 in English and held by 0 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.62 (from 0.49 for Hurricane ... to 0.85 for Federal in ...)

Privacy : wiretapping and electronic eavesdropping
Alternative Names
Stevens, G.

Stevens, G. (Gina)

Languages
English (76)

Covers
Privacy : total information awareness programs and latest developments