000 | 03353cam a2200433 i 4500 | ||
---|---|---|---|
001 | 21578275 | ||
003 | OSt | ||
005 | 20250412174507.0 | ||
008 | 200623s2022 maua b 001 0 eng | ||
010 | _a 2020028528 | ||
020 | _a9781284207804 [paperback] | ||
040 |
_aDLC _beng _cDLC _erda _dDLC |
||
042 | _apcc | ||
043 | _an-us--- | ||
082 | 0 | 0 | _223 |
100 | 1 |
_aGrama, Joanna Lyn, _eauthor. |
|
240 | 1 | 0 | _aLegal issues in information security |
245 | 1 | 0 |
_aLegal and privacy issues in information security / _cJoanna Lyn Grama. |
250 | _aThird edition. | ||
260 |
_aBurlingtron, Massachusetts : _bJOnes & Barlett Learning, _cc2022. |
||
300 |
_axxiii, 525 pages : _billustrations (black and white) ; _c24 cm. |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _aunmediated |
||
338 |
_2rdacarrier _avolume |
||
504 | _aIncludes bibliographical references, glossary, and index. | ||
505 | _aContents: Part I Fundamental concepts -- Chapter 1Information security overview -- Chapter 2 Privacy overview -- Chapter 3 The American legal system -- Part II Laws influencing information security -- Chapter 4 Security and privacy of consumer financial information -- Chapter 5 Security and privacy of information belonging to children and in educational records -- Chapter 6 Security and privacy of health information -- Chapter 7 Corporate information security and privacy regulation -- Chapter 8 Federal government information security and privacy regulations -- Chapter 9 State laws protecting citizen information and breach notification laws -- Chapter 10 Intellectual property law -- Chapter 11 The role of contracts -- Chapter 12 Criminal law and tort law issues in cyberspace -- Part III Security and privacy in organizations -- Chapter 13 Information security governance -- Chapter 14 Risk analysis, incident response, and contingency planning -- Chapter 15 Computer forensic and investigations. | ||
520 | _a"The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers."--Provided by the publisher | ||
521 | _aAdult | ||
541 |
_aCD Books _xBrigoli, Darlyne _yCollege of Computer Studies _zComputer Engineering |
||
546 | _aText in English | ||
650 | 0 |
_aInformation storage and retrieval systems _xLaw and legislation _zUnited States. |
|
650 | 0 |
_aData protection _xLaw and legislation _zUnited States. |
|
650 | 0 |
_aInformation storage and retrieval systems _xSecurity measures _xLaw and legislation _zUnited States. |
|
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
998 |
_cJanna [new] _d04/12/2025 |
||
999 |
_c13498 _d13498 |