Loading [Contrib]/a11y/accessibility-menu.js
Hous. L. Rev.
  • Menu
  • Articles
    • Articles
    • Books
    • Comments
    • Copyright in Context Symposium
    • Criminal Justice Institute Symposia
    • Essays
    • Frankel Lecture Series
    • Health Law Symposium
    • Houston Law Review Online
    • Institute for Intellectual Property & Information Law (IPIL) Spring Lectures
    • Institute for Intellectual Property & Information Law (IPIL) Symposia
    • Lectures
    • Notes
    • Sondock Jurist-in-Residence Series
    • Symposium: School Violence, School Safety, and the Juvenile Justice System
    • Tributes
    • Voting Rights Symposium
    • All
  • For Authors
  • Editorial Board
  • About
  • Issues
  • Blog
  • Subscriptions
  • For Students
  • Podcast
  • Houston Law Review Online
  • search

    Sorry, something went wrong. Please try your search again.
    ×

    • Articles
    • Blog posts

RSS Feed

Enter the URL below into your favorite RSS reader.

https://houstonlawreview.org/feed
×
Comments
Vol. 43, Issue 5, 2007January 12, 2007 CDT

Database Security Breach Notification Statutes: Does Placing the Responsibility on the True Victim Increase Data Security?

Lilia Rode,
privacy identity theft victim statutes notification security database
Photo by Markus Spiske on Unsplash
Hous. L. Rev.
Lilia Rode, Database Security Breach Notification Statutes: Does Placing the Responsibility on the True Victim Increase Data Security?, 43 Hous. L. Rev. 1597 (2007).
Save article as...▾
  • PDF
  • XML
  • Citation (BibTeX)

View more stats

Powered by Scholastica, the modern academic journal management system