The IT Law Wiki
No edit summary
Line 23: Line 23:
 
=== Security ===
 
=== Security ===
   
  +
A '''breach''' is
''See'' [[security breach]]
 
  +
  +
{{Quote|[a]ny illegal [[penetration]] or [[unauthorized access]] to a [[computer system]] that causes [[damage]] or has the potential to cause [[damage]].<ref>[[DM3595-001]]. at 3.</ref>}}
  +
 
''See also'' [[security breach]].
   
 
== References ==
 
== References ==

Revision as of 04:32, 28 December 2013

Definitions

Contract law

See breach of contract

General

A breach is the

[e]ffect of or deteriorating resulting from an act of aggression or attack whose impact may be: tangible (physical or material alteration, logic malfunction, disorganization of procedures, etc.); logical (non-availability, loss of integrity, breach of confidentiality); strategic (in particular as concerns finance, additional costs for hosting, transportation, telecommunications, expertise, purchase/rental of hardware and software, personnel, outsourcing, operating losses (profit margin, cash flow, customer losses), loss of funds or goods, etc.).[1]

HITECH Act

A breach is the

unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.[2]

Privacy law

See data breach; data security breach

Security

A breach is

[a]ny illegal penetration or unauthorized access to a computer system that causes damage or has the potential to cause damage.[3]

See also security breach.

References

  1. Cybersecurity Guide for Developing Countries, at 104.
  2. Pub. L. No. 111-5, §13400(1). Not included in the definition of breach are any unintentional acquisition, use, or access of PHI by an employee or other authorized individual of a covered entity or a business associate done in good faith and within the scope of employment or the relationship where such information is not breached any further; or inadvertent disclosures by authorized persons of PHI within the same facility; and information received as a result of such disclosure is not further disclosed without authorization.
  3. DM3595-001. at 3.