Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records, identity theft, and fraud. Employees are raising questions about acceptable use of phones, e-mail, the Web, and if and when employers can monitor use. Employers find that without policies governing use of these assets, they have no legal basis for action against employees. The Privacy Papers: Managing Technology, Consumer, Employee, and Legislative Actions is a book for C-level executives, IT managers, HR managers, security officers, privacy officers, and legal professionals. It covers all aspects of technology and legislation that enable privacy and also those that place it at risk. This how-to guide presents sample policies for employee training, awareness, and acceptable use; covers why companies must protect data and how to do it; describes the technology that makes information more private; and lists and summarizes major federal and international privacy legislation. Corporate espionage can put sensitive company information such as intellectual property, product development, marketing plans, and customer files at risk. With the ever-increasing legislation concerning privacy, it is important for executives to stay up to date. The Privacy Papers will ensure that any company conducting business domestically or internationally will understand how policies governing use of their assets will affect daily operations.
This book covers a lot of ground, with information that will be of interest to IT security, HR and privacy managers (in some large companies security and privacy are combined into a single function), internal auditors, and database, systems and network administrators.The first section, Business Organization Issues, covers policies for a number of functional areas, auditing, e-commerce issues, and related concerns at the administrative level. Technology is also addressed as a high-level, as are topical concerns such as identity theft and internet activities.Section two covers the full range of applicable tools and related technologies, including encryption/cryptography, cookies and profiling, monitoring and content filtering, wireless communications and data mining.In the final section US and international laws and issues are covered at a high level, but sufficiently detailed to provide the salient issues. Although there are some minor gaps in this section, it was up-to-date when it was published, and the gaps can be addressed through extrapolation and other publications. The most notable gap is the absence of Sarbanes-Oxley Act Section 404 requirements related to data access and manipulation, and other assurance measures. That said, the material in this book is consistent with SOA, and the information and advice map nicely to it if you cross reference requirements to business organization issues, and tools and technologies sections of this book.
Great Desk Reference
Published by Thriftbooks.com User , 21 years ago
This book covers the wide spectrum of privacy issues facing businesses today...from laws and regulations to technology to business policies, procedures and other topics. The variety of writers for the many sections provides a great breadth of viewpoints, advice, knowledge, experience and interpretation of many privacy issues and how to address them within an organization.I have used this often for addressing privacy compliance and awareness issues within my organization. I look forward to getting the next edition when it becomes available!
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.