The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions, 1st Edition (Hardback) book cover

The Privacy Papers

Managing Technology, Consumer, Employee and Legislative Actions, 1st Edition

By Rebecca Herold

Auerbach Publications

712 pages | 40 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849312489
pub: 2001-12-20
SAVE ~$34.00
Currently out of stock
$170.00
$136.00
x
eBook (VitalSource) : 9780429134814
pub: 2001-12-20
from $28.98


FREE Standard Shipping!

Description

Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records, identity theft, and fraud. Employees are raising questions about acceptable use of phones, e-mail, the Web, and if and when employers can monitor use. Employers find that without policies governing use of these assets, they have no legal basis for action against employees.

The Privacy Papers: Managing Technology, Consumer, Employee, and Legislative Actions is a book for C-level executives, IT managers, HR managers, security officers, privacy officers, and legal professionals. It covers all aspects of technology and legislation that enable privacy and also those that place it at risk. This how-to guide presents sample policies for employee training, awareness, and acceptable use; covers why companies must protect data and how to do it; describes the technology that makes information more private; and lists and summarizes major federal and international privacy legislation.

Corporate espionage can put sensitive company information such as intellectual property, product development, marketing plans, and customer files at risk. With the ever-increasing legislation concerning privacy, it is important for executives to stay up to date. The Privacy Papers will ensure that any company conducting business domestically or internationally will understand how policies governing use of their assets will affect daily operations.

Reviews

"…a timely and invaluable sourcebook on privacy issues from A to Z…crafted by Rebecca Herod, CISSP, CISA, and FLMI, a highly respected and experienced information security professional…Herod's contributors read like a Who's Who list of information security professionals…a rich, timely, and essential resource."

Computer Security Alert, November 2001

Table of Contents

Introduction

BUSINESS ORGANIZATION ISSUES

E-mail Policies

Monitoring Policies

Customer Web Privacy Policies

Education and Awareness Training

Keeping Personal Information Private

Attorney-Client Privilege and Electronic Communications

Corporate Spies

Auditing and Privacy

Computer Forensics

Electronic Identifiers

International Communications

Anonymous Internet Activity

E-Commerce and Confidentiality Issues

Information Security and Privacy Officer Roles

Health-Related Information

Criminal Internet Activity

Identity Theft

Legal Primer for ISPs

TOOLS AND RELATED TECHNOLOGY

Encryption and Cryptography

Steganography

Cookies and Profiling

Monitoring and Content Filtering

Wireless Communications

Data Mining and Customer Retention Management

Third-Party Assurance Privacy and Security Certifications

Confidentiality Agreements

UNITED STATES OF AMERICA LAWS AND ISSUES

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

Gramm-Leach-Bliley Act (GLB) (1999)

Overviews of other U.S. Privacy-Related Laws and Regulations

Bills Under Consideration

Government Surveillance on the Internet

INTERNATIONAL LAWS AND ISSUES

European Union Data Protection Directive (1995)

Safe Harbor

Lists and Overviews of Other International Laws, Regulations, and Issues

PRIVACY RESOURCES

About the Editor

Index

About the Authors

Herold\, Rebecca

About the Series

Best Practices

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
COM032000
COMPUTERS / Information Technology
COM053000
COMPUTERS / Security / General
LAW026000
LAW / Criminal Law / General
MED035000
MEDICAL / Health Care Delivery