Two-Factor Authentication: A Solution to Times Past or Present? The Debate Surrounding the Gramm-Leach-Bliley Security Safeguards Rule and the Methods of Risk Assessment and Compliance
Publisher:
Ohio State University. Moritz College of LawCitation:
I/S: A Journal of Law and Policy for the Information Society, vol. 2, no. 3 (2006), 761-779.Type:
ArticleISSN:
2372-2959 (print)Rights:
This item may be protected by copyright, and is made available here for research and educational purposes. The user is responsible for making a final determination of copyright status. If copyright protection applies, permission must be obtained from the copyright holder to reuse, publish, or reproduce the object beyond the bounds of Fair Use or other exemptions to the law.Collections
Items in Knowledge Bank are protected by copyright, with all rights reserved, unless otherwise indicated.