
The Privacy Papers
Managing Technology, Consumer, Employees, and Legislative Actions
Résumé
The Privacy Paper : Managing Technology, Consumer, Employees, and Legislative Actions is a book for C-level executives, IT managers, HR managers, security officers, privacy officers, and legal professionals. Il covers all aspects of technology and legislation that enable privacy and also those that place it at risk. This how-to guide presents sample policies for employees training, awareness, and acceptable use; covers why companies must protect data and how to do it; describes the technology that makes information more private; and lists and summarizes major federals, and international privacy legislation.
Corporate espionage can put sensitive company information such as intellectual property, product development, marketing plans, and customer files at risk. With the ever-increasing legislation concerning privacy, it la important for executives to stay up to date. The Privacy Paper will ensure that any company conducting business domestically or internationally will understand how policies governing use of their assets will affect daily operations.
Features
- Describes technologies that increase the privacy of personal and organizational data and those that make it more vulnerable
- Lists and summarizes major federal and international privacy legislation
- Provides sample acceptable use policies
- Discusses, issues raising privacy concerns and driving government intervention
- Outlines a framework for the protection of personal and organizational data
- Foreword xv
- Preface xix
- Introduction xxi
Part A E-Mail Policies
- Chapter 1 E-Mail: Balancing Corporate Assets and Employee Privacy 3
- Chapter 2 Control Issues in an E- Mail Personal Privacy Invasion Prevention Policy 15
- Chapter 3 Developing an Organizational Internet Policy 23
- Chapter 4 Computer Forensics and Privacy: At What Price Do We Police the Internet? 33
- Chapter 5 Policies for Secure Personal Data 41
- Chapter 6 Making Security Awareness Happen 51
- Chapter 7 The Case for Privacy 85
- Chapter 8 Attorney--Client Privilege and Electronic Data Transmission 93
- Chapter 9 Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore! 103
- Chapter 10 A Tale of Two Spies: The Outside Hacker and the Trusted Insider 111
- Chapter 11 Federal Laws Affecting IS Auditors 117
- Chapter 12 Computer Forensics 135
- Chapter 13 The Dangerous Precedent Set in the Use of Electronic Identifiers 151
- Chapter 14 Jurisdictional Issues in Global Transmissions 161
- Chapter 15 Anonymity on the Internet: ACLU of Georgia v. Miller 173
- Chapter 16 The Continuing Disintegration of Confidentiality 181
- Chapter 17 Selected Security and Legal Issues in E-Commerce 189
- Chapter 18 Security Awareness Program and Information Security Roles 199
- Chapter 19 Information Security Standards: Deluge and Dearth 215
- Chapter 20 The Role of the Chief Medical Information Officer 223
- Chapter 21 Information Security Management in the Healthcare Industry 239
- Chapter 22 Criminal Activity on the Internet 255
- Chapter 23 Identity Theft: Who Are You Anyway? 267
- Chapter 24 ID Theft: When Bad Things Happen to Your Good Name 275
- Chapter 25 To Disclose or Not to Disclose: A Legal Primer for ISPs 299
Part A Encryption and Cryptography
- Chapter 26 Selecting a Cryptographic System 317
- Chapter 27 A New Paradigm Hidden in Steganography 331
- Chapter 28 Cookies and Web Bugs: What They Are and How They Work Together 351
- Chapter 29 Online Profiling: Benefits and Concerns 365
- Chapter 30 Where Is the IDS? 377
- Chapter 31 Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues 385
- Chapter 32 Ethics and the Internet 395
- Chapter 33 Security of Wireless Local Area Networks 411
- Chapter 34 Customer Relationship Management and Data Warehousing 421
- Chapter 35 Anonymity, Privacy, and Trust 431
- Chapter 36 Web Certification: A Benchmark for Trustworthy Commerce 437
- Chapter 37 Get It in Writing 443
Part A Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- Chapter 38 Standards for Privacy of Individually Identifiable Health Information 449
- Chapter 39 Health Privacy Regulation Enhances Protection of Patient Records but Raises Practical Concerns 493
- Chapter 40 Financial Services Modernization Act 509
- Chapter 41 Gramm--Leach--Bliley (GLB) Financial Services Modernization Act 517
- Chapter 42 Overviews of Privacy-Related U.S. Laws and Regulations 529
- Chapter 43 U.S. Bills Under Consideration 539
- Chapter 44 Internet Security and Privacy 543
- Chapter 45 Independent Review of the Carnivore System for the Department of Justice 555
Part A European Union Data Protection Directive (1995)
- Chapter 46 The European Data Protection Directive: A Roadblock to International Trade? 569
- Chapter 47 Data Privacy Directive 95/46 EC: Protecting Personal Data and Ensuring Free Movement of Data 583
- Chapter 48 Safe Harbor Overview 619
- Chapter 49 International Privacy Laws 625
- Chapter 50 Privacy Resources 635
- About the Editor 639
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Auerbach |
Auteur(s) | Rebecca Herold |
Parution | 07/03/2002 |
Nb. de pages | 678 |
Format | 16 x 24 |
Couverture | Relié |
Poids | 1157g |
Intérieur | Noir et Blanc |
EAN13 | 9780849312489 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse