Practical Guidance
Time-saving Solutions
Knowledgeable Insights

Information Security Law: Control of Digital Assets

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them. It is filled with practical advice on all aspects of implementing effective internal controls, protecting user privacy, preventing computer crimes, leveraging intellectual property and avoiding regulatory scrutiny.
Publisher: ALM
ALM Product :BOOK
$764.00

Sold and shipped by ALM

Buy from ALM
In Stock
ISBN: 9781588521392
Publisher: ALM
International Order Inquiry

Product details

For most organizations, an effective information security policy is vitally important. In some instances, it is a legal requirement.

Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them. It is filled with practical advice on all aspects of implementing effective internal controls, protecting user privacy, preventing computer crimes, leveraging intellectual property and avoiding regulatory scrutiny.

Written for lawyers, compliance officers, network administrators, and anyone who oversees the preservation and use of networked data, this important book examines such topics as: ensuring the accuracy of data used to generate financial reports; protecting consumers' personally identifiable information; the Gramm-Leach-Bliley Act's privacy and safeguards rules; HIPAA restrictions on the use of medical information; state and federal remedies for attacks on computer systems; avoiding liability when monitoring computer systems; and more.

Whether your responsibilities include securing networks or creating an adequate plan for responding to security incidents, Information Security Law: Control of Digital Assets will make a difficult job much easier.

Featured Authors

Table of Contents


CHAPTER 1

Information Technology



CHAPTER 2

Corporate Governance



CHAPTER 3

Policies and Procedures



CHAPTER 4

Consumer Data Privacy



CHAPTER 5

Financial Data Privacy



CHAPTER 6

Credit Data Privacy



CHAPTER 7

Health Data Privacy



CHAPTER 8

Government Data Privacy



CHAPTER 9

Computer Crime



CHAPTER 10

Electronic Surveillance



CHAPTER 11

Intellectual Property



CHAPTER 12

Regulation