Legal and Privacy Issues in Information Security with Theory Labs: .
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issue s in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Lab s: Lab 1: Understanding the Importance of an IT Asset Inventory Lab 2: Creating a Privacy Impact Assessment Lab 3: Securing Credit Card Holder Data Lab 4: Analyzing and Comparing GLBA and HIPAA Lab 5: Cataloging Threats and Vulnerabilities Lab 6: Identifying the Scope of Your State’s Data Security Breach Notification Law Lab 7: Researching Cyberstalking and Cyberbullying Laws Lab 8: Analyzing Information Security Policies Lab 9: Conducting a Risk Assessment Lab 10: Preparing for Incident Response © 2022
1138490112
Legal and Privacy Issues in Information Security with Theory Labs: .
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issue s in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Lab s: Lab 1: Understanding the Importance of an IT Asset Inventory Lab 2: Creating a Privacy Impact Assessment Lab 3: Securing Credit Card Holder Data Lab 4: Analyzing and Comparing GLBA and HIPAA Lab 5: Cataloging Threats and Vulnerabilities Lab 6: Identifying the Scope of Your State’s Data Security Breach Notification Law Lab 7: Researching Cyberstalking and Cyberbullying Laws Lab 8: Analyzing Information Security Policies Lab 9: Conducting a Risk Assessment Lab 10: Preparing for Incident Response © 2022
125.95 In Stock
Legal and Privacy Issues in Information Security with Theory Labs: .

Legal and Privacy Issues in Information Security with Theory Labs: .

by Joanna Lyn Grama
Legal and Privacy Issues in Information Security with Theory Labs: .

Legal and Privacy Issues in Information Security with Theory Labs: .

by Joanna Lyn Grama

(3rd ed.)

$125.95 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issue s in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Lab s: Lab 1: Understanding the Importance of an IT Asset Inventory Lab 2: Creating a Privacy Impact Assessment Lab 3: Securing Credit Card Holder Data Lab 4: Analyzing and Comparing GLBA and HIPAA Lab 5: Cataloging Threats and Vulnerabilities Lab 6: Identifying the Scope of Your State’s Data Security Breach Notification Law Lab 7: Researching Cyberstalking and Cyberbullying Laws Lab 8: Analyzing Information Security Policies Lab 9: Conducting a Risk Assessment Lab 10: Preparing for Incident Response © 2022

Product Details

ISBN-13: 9781284220476
Publisher: Jones & Bartlett Learning
Publication date: 12/17/2020
Edition description: 3rd ed.
Product dimensions: 0.00(w) x 0.00(h) x 0.00(d)

About the Author

Joanna Lyn Grama (JD, CISSP, CIPT, CRISC) is an Associate Vice President at Vantage Technology Consulting Group. She has more than 20 years of experience in higher education with a strong focus on law, IT security policy, compliance, governance, and data privacy issues.Grama is a former member of the U.S. Department of Homeland Security’s Data Privacy and Integrity Advisory Committee (appointed to the Committee by Secretary Janet Napolitano) and served as the chairperson of its technology subcommittee. Grama is also vice president of the board of directors for the central Indiana Information Systems Audit and Control Association (ISACA) chapter; and a member of the International Association for Privacy Professionals (IAPP); the American Bar Association, Section of Science and Technology Law, Information Security Committee; and the Indiana State Bar Association. She is a frequent speaker on a variety of IT security topics, including identity theft, personal information security, and university security and privacy compliance issues.
From the B&N Reads Blog

Customer Reviews