000 03353cam a2200433 i 4500
001 21578275
003 OSt
005 20250412174507.0
008 200623s2022 maua b 001 0 eng
010 _a 2020028528
020 _a9781284207804 [paperback]
040 _aDLC
_beng
_cDLC
_erda
_dDLC
042 _apcc
043 _an-us---
082 0 0 _223
100 1 _aGrama, Joanna Lyn,
_eauthor.
240 1 0 _aLegal issues in information security
245 1 0 _aLegal and privacy issues in information security /
_cJoanna Lyn Grama.
250 _aThird edition.
260 _aBurlingtron, Massachusetts :
_bJOnes & Barlett Learning,
_cc2022.
300 _axxiii, 525 pages :
_billustrations (black and white) ;
_c24 cm.
336 _2rdacontent
_atext
337 _2rdamedia
_aunmediated
338 _2rdacarrier
_avolume
504 _aIncludes bibliographical references, glossary, and index.
505 _aContents: Part I Fundamental concepts -- Chapter 1Information security overview -- Chapter 2 Privacy overview -- Chapter 3 The American legal system -- Part II Laws influencing information security -- Chapter 4 Security and privacy of consumer financial information -- Chapter 5 Security and privacy of information belonging to children and in educational records -- Chapter 6 Security and privacy of health information -- Chapter 7 Corporate information security and privacy regulation -- Chapter 8 Federal government information security and privacy regulations -- Chapter 9 State laws protecting citizen information and breach notification laws -- Chapter 10 Intellectual property law -- Chapter 11 The role of contracts -- Chapter 12 Criminal law and tort law issues in cyberspace -- Part III Security and privacy in organizations -- Chapter 13 Information security governance -- Chapter 14 Risk analysis, incident response, and contingency planning -- Chapter 15 Computer forensic and investigations.
520 _a"The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers."--Provided by the publisher
521 _aAdult
541 _aCD Books
_xBrigoli, Darlyne
_yCollege of Computer Studies
_zComputer Engineering
546 _aText in English
650 0 _aInformation storage and retrieval systems
_xLaw and legislation
_zUnited States.
650 0 _aData protection
_xLaw and legislation
_zUnited States.
650 0 _aInformation storage and retrieval systems
_xSecurity measures
_xLaw and legislation
_zUnited States.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
998 _cJanna [new]
_d04/12/2025
999 _c13498
_d13498