Skip to main content

Currently Skimming:


Pages 31-37

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 31...
... TCRP LRD 59 31 secret that is the subject of the action."254 Owners may also obtain damages for actual loss caused by the misappropriation of the trade secret.255 The DTSA supplements, but does not preempt, state law.256 D UTSA and State Laws Technology acquired or developed by transit agencies may be protected as a trade secret under a state's UTSA that applies to a misappropriation of trade secrets.257 UTSA is a model law drafted by the National Conference of Commissioners on Uniform State Laws.
From page 32...
... 32 TCRP LRD 59 is the need to protect computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.265 Taken as a whole, this is cybersecurity. There are state laws, regulations, and guidelines that require data collectors and processors to limit access to -- and protect the security of -- customers' personal data.
From page 33...
... TCRP LRD 59 33 nation's critical infrastructure according to the U.S. Cybersecurity and Infrastructure Security Agency (CISA)
From page 34...
... 34 TCRP LRD 59 D Federal Cybersecurity Laws Applicable to Federal Agencies, Federal Contractors, and Recipients of Federal Funds 1.  The Federal Information Security Modernization Act  of 2014 The Federal Information Security Management Act of 2002, and its replacement the Federal Information Security Modernization Act of 2014 (FISMA)
From page 35...
... TCRP LRD 59 35 SSI@dot.gov. Do not discuss SSI at all with friends or family (unless they are covered parties with a need to know)
From page 36...
... 36 TCRP LRD 59 (vii) Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.
From page 37...
... TCRP LRD 59 37 comply with the general data breach notification requirements and are subject to additional requirements.311 Connecticut has a statute that applies to state contractors and contains specific data security and breach notification requirements that must be included in contracts.312 State and local transit agencies should consult their state's laws when implementing emerging technologies to ensure compliance with applicable data security and breach notification requirements.

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.