Definitions [ ]
Computer security [ ]
the obligations of individuals and institutions to use
information under their control appropriately once it has been disclosed to them. One observes rules of confidentiality out of respect for and to protect and preserve the privacy of others.
Data [ ]
Data confidentiality is
FISMA [ ]
Federal Information Security Management Act of 2002, confidentiality means
A loss of confidentiality is the
unauthorized disclosure of information.
General [ ] Confidentiality refers to "the nondisclosure of information beyond an authorized group of people."
"A pledge of
confidentiality is a promise not to further share information that has already been shared. In commercial environments, this protects privacy because it allows sharing consistent with what a consumer likely wants, and no further. When governments mandate the collection of information, confidentiality rules approximate privacy as well as possible."
Research [ ]
Contract clause [ ]
"This language outlines
confidential material, knowledge or information that the parties exchange, such as customer PII or company trade secrets. The parties agree not to share further or disclose information obtained under the contract."
References [ ]
NIST Special Publication 800-33.
Electricity Subsector Cybersecurity Risk Management Process, at 61; 44 U.S.C. §3542.
Privacy and Civil Liberties Policy Development Guide and Implementation Templates, App. E, Glossary.
ITU, "Compendium of Approved ITU-T Security Definitizons," at 15 (Feb. 2003 ed.) ( full-text).
Mobile Medical Applications: Guidance for Industry and Food and Drug Administration Staff, at 59.
See 44 U.S.C. §3501 note.
↑ 44 U.S.C. §3542(b)(1)(B).
↑ ISO 13335-1:2004; 45 C.F.R. §164.304 ("
Confidentiality means the property that data or information is not made available or disclosed to unauthorized persons or processes.")
Framework for Privacy Analysis of Programs, Technologies, and Applications, at 7 n.2.
Putting People on the Map: Protecting Confidentiality with Linked Social-Spatial Data, at 13.
Report on Cybersecurity Practices, at 28.
See also [ ]