Legal and privacy issues in information security / Joanna Lyn Grama.

By: Grama, Joanna Lyn [author.]Material type: TextTextPublisher: Burlingtron, Massachusetts : JOnes & Barlett Learning, c2022Edition: Third editionDescription: xxiii, 525 pages : illustrations (black and white) ; 24 cmContent type: text Media type: unmediated Carrier type: volume ISBN: 9781284207804 [paperback]Uniform titles: Legal issues in information security Subject(s): Information storage and retrieval systems -- Law and legislation -- United States | Data protection -- Law and legislation -- United States | Information storage and retrieval systems -- Security measures -- Law and legislation -- United StatesDDC classification:
Contents:
Contents: Part I Fundamental concepts -- Chapter 1Information security overview -- Chapter 2 Privacy overview -- Chapter 3 The American legal system -- Part II Laws influencing information security -- Chapter 4 Security and privacy of consumer financial information -- Chapter 5 Security and privacy of information belonging to children and in educational records -- Chapter 6 Security and privacy of health information -- Chapter 7 Corporate information security and privacy regulation -- Chapter 8 Federal government information security and privacy regulations -- Chapter 9 State laws protecting citizen information and breach notification laws -- Chapter 10 Intellectual property law -- Chapter 11 The role of contracts -- Chapter 12 Criminal law and tort law issues in cyberspace -- Part III Security and privacy in organizations -- Chapter 13 Information security governance -- Chapter 14 Risk analysis, incident response, and contingency planning -- Chapter 15 Computer forensic and investigations.
Summary: "The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers."--Provided by the publisher
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Subject Reference Subject Reference College Annex Library
Subject Reference
342.730858 G76 2022 (Browse shelf) Available 3UCBL000028700

Includes bibliographical references, glossary, and index.

Contents: Part I Fundamental concepts -- Chapter 1Information security overview -- Chapter 2 Privacy overview -- Chapter 3 The American legal system -- Part II Laws influencing information security -- Chapter 4 Security and privacy of consumer financial information -- Chapter 5 Security and privacy of information belonging to children and in educational records -- Chapter 6 Security and privacy of health information -- Chapter 7 Corporate information security and privacy regulation -- Chapter 8 Federal government information security and privacy regulations -- Chapter 9 State laws protecting citizen information and breach notification laws -- Chapter 10 Intellectual property law -- Chapter 11 The role of contracts -- Chapter 12 Criminal law and tort law issues in cyberspace -- Part III Security and privacy in organizations -- Chapter 13 Information security governance -- Chapter 14 Risk analysis, incident response, and contingency planning -- Chapter 15 Computer forensic and investigations.

"The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers."--Provided by the publisher

Adult

CD Books Brigoli, Darlyne College of Computer Studies Computer Engineering

Text in English

There are no comments on this title.

to post a comment.

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha