Information Security Law: Control of Digital Assets

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them. It is filled with practical advice on all aspects of implementing effective internal controls, protecting user privacy, preventing computer crimes, leveraging intellectual property and avoiding regulatory scrutiny.
Publisher: ALM
eBook :epub
$766.00
Quantity
In Stock
ISBN: 9781588523013
Publisher: ALM
International Order Inquiry
Book Edition: 25

Product details

For most organizations, an effective information security policy is vitally important. In some instances, it is a legal requirement.

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them. It is filled with practical advice on all aspects of implementing effective internal controls, protecting user privacy, preventing computer crimes, leveraging intellectual property and avoiding regulatory scrutiny.

Written for lawyers, compliance officers, network administrators, and anyone who oversees the preservation and use of networked data, this important book examines such topics as: ensuring the accuracy of data used to generate financial reports; protecting consumers' personally identifiable information; the Gramm-Leach-Bliley Act's privacy and safeguards rules; HIPAA restrictions on the use of medical information; state and federal remedies for attacks on computer systems; avoiding liability when monitoring computer systems; and more.

Whether your responsibilities include securing networks or creating an adequate plan for responding to security incidents, Information Security Law: Control of Digital Assets will make a difficult job much easier.

Table of Contents

CHAPTER 1
Information Technology

CHAPTER 2
Corporate Governance

CHAPTER 3
Policies and Procedures

CHAPTER 4
Consumer Data Privacy

CHAPTER 5
Financial Data Privacy

CHAPTER 6
Credit Data Privacy

CHAPTER 7
Health Data Privacy

CHAPTER 8
Government Data Privacy

CHAPTER 9
Computer Crime

CHAPTER 10
Electronic Surveillance

CHAPTER 11
Intellectual Property

CHAPTER 12
Regulation