Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records, identity theft, and fraud. Employees are raising questions about acceptable use of phones, e-mail, the Web, and if and when employers can monitor use. Employers find that without policies governing use of these assets, they have no legal basis for...
Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears a...
Say What You Do: Building a framework of IT controls, policies, standards, and procedures is the definitive guide to process documentation. Written by an all-star team of award winning writers, internationally acclaimed lawyers and IT auditors, Say What You Do walks the reader through all of the steps necessary for creating a compliance-driven IT controls framework, policies, standards, and procedures. Included are techniques for solid writing, editing, and policy, standard, and procedure dissemination.
Say What You Do: Building a framework of IT controls, policies, standards, and procedures is the definitive guide to process documentation. Written by...
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed...
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) p...
This book will inform readers without overwhelming them with too much technical detail. It will help them communicate more effectively with IT, telecom, and cyber security professionals as they work to build privacy into their daily work activities. The book supplies guidance for privacy management activities and privacy framework components focused on the Smart Grid. The authors, who are privacy professionals instead of engineers writing on privacy issues, draw upon their extensive experience within the utilities business sector, along with their work with NIST in the Cyber Security...
This book will inform readers without overwhelming them with too much technical detail. It will help them communicate more effectively with IT, tel...