Information disclosure and security information protection at water utilities

被引:0
|
作者
Herrick, Charles [1 ]
Blaha, Frank J. [1 ]
机构
[1] Stratus Consulting Inc, Washington, DC USA
来源
关键词
Environmental protection - Information management - Law enforcement - Security of data - Security systems;
D O I
10.1002/j.1551-8833.2007.tb08077.x
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The water utilities have been focusing greatly on efforts and concern on system security after terrorist attacks of September 11, 2001. The Bioterrorism Preparedness and Response Act of 2002 requires systems serving more than 3300 people to conduct security-oriented vulnerability assessments (VA) of their facilities. These VAs should meet the requirements that are specified by the US Environmental Protection Agency (USEPA) and must be documented in the reports submitted to the USEPA. The Bioterrorism Act exempted VAs from the Freedom of Information Act (FOIA) release and specified various protections from such reports. FOIA laws have included various types and levels of exemption including trade secrets, confidential business information, law enforcement records, and personal information. Information management protocols should be flexible to address access to utility information by customers, general public, utility partners, and regulatory agencies and oversight bodies.
引用
收藏
页码:40 / 42
页数:3
相关论文
共 50 条
  • [1] Information Disclosure and the Diffusion of Information Security Attacks
    Mitra, Sabyasachi
    Ransbotham, Sam
    INFORMATION SYSTEMS RESEARCH, 2015, 26 (03) : 565 - 584
  • [2] Information Disclosure as a Means to Security
    Rabinovich, Zinovi
    Jiang, Albert Xin
    Jain, Manish
    Xu, Haifeng
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 645 - 653
  • [3] Information Disclosure, Security, and Data Quality
    Zaman, A. N. K.
    Obimbo, Charlie
    Dara, Rozita A.
    RECENT TRENDS AND FUTURE TECHNOLOGY IN APPLIED INTELLIGENCE, IEA/AIE 2018, 2018, 10868 : 768 - 779
  • [4] Information security and data protection
    Qureshi, AA
    Siegel, JG
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2001, 14 (1-3) : 1 - 16
  • [5] Challenges in Information Security Protection
    Pereira, Teresa
    Santos, Henrique
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 160 - 166
  • [6] IS professionals' information security behaviors in Chinese IT organizations for information security protection
    Ma, Xiaofen
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (01)
  • [7] Regulation under asymmetric information in water utilities
    Brocas, I
    Chan, K
    Perrigne, I
    AMERICAN ECONOMIC REVIEW, 2006, 96 (02): : 62 - 66
  • [8] A CBK for Information Security and Critical Information and Communication Infrastructure Protection
    Theoharidou, Marianthi
    Xidara, Dimitra
    Gritzalis, Dimitris
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 81 - 96
  • [9] Secondary School Information Protection as a Factor of Students' Information Security
    Rotanova, Mira B.
    Shimichev, Alexey S.
    Golvanov, Ivan A.
    PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 609 - 612
  • [10] Information security protection in hybrid office
    Ma, Jun
    Alias, Syazwina
    Huang, Chunya
    ACM International Conference Proceeding Series, : 21 - 25