This website uses cookies

We use cookies to enhance your experience and support COUNTER Metrics for transparent reporting of readership statistics. Cookie data is not sold to third parties or used for marketing purposes.

Skip to main content
null
Hous. L. Rev.
  • Menu
  • Articles
    • Articles
    • Books
    • Comments
    • Copyright in Context Symposium
    • Criminal Justice Institute Symposia
    • Essays
    • Frankel Lecture Series
    • Health Law Symposium
    • Houston Law Review Online
    • Institute for Intellectual Property & Information Law (IPIL) Spring Lectures
    • Institute for Intellectual Property & Information Law (IPIL) Symposia
    • Lectures
    • Notes
    • Sondock Jurist-in-Residence Series
    • Symposium: School Violence, School Safety, and the Juvenile Justice System
    • Tributes
    • Voting Rights Symposium
    • All
  • For Authors
  • Editorial Board
  • About
  • Issues
  • Blog
  • Subscriptions
  • For Students
  • Podcast
  • Houston Law Review Online
  • search
  • X (formerly Twitter) (opens in a new tab)
  • Facebook (opens in a new tab)
  • LinkedIn (opens in a new tab)
  • RSS feed (opens a modal with a link to feed)

RSS Feed

Enter the URL below into your favorite RSS reader.

http://localhost:35234/feed
ISSN 0018-6694
Comments
Vol. 43, Issue 5, 2007January 12, 2007 CDT

Database Security Breach Notification Statutes: Does Placing the Responsibility on the True Victim Increase Data Security?

Lilia Rode,
privacyidentity theftvictimstatutesnotificationsecuritydatabase
Photo by Markus Spiske on Unsplash
Hous. L. Rev.
Lilia Rode, Database Security Breach Notification Statutes: Does Placing the Responsibility on the True Victim Increase Data Security?, 43 Hous. L. Rev. 1597 (2007).

View more stats

Powered by Scholastica, the modern academic journal management system