Managing Legal And Security Risks In Computing And Communications

Managing Legal And Security Risks In Computing And Communications

by Paul Shaw, Shaw
     
 

ISBN-10: 0750699388

ISBN-13: 9780750699389

Pub. Date: 12/01/1997

Publisher: Elsevier Science

The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in

Overview

The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations.

Managing Legal and Security Risks in Computing and Communications will:
· help you quickly locate pertinent laws
· provide guidance on the laws
· present a legal reference for developing training material
· help you foster a continuing dialog with legal counsel

Detailed discussion of the laws requiring organizations to retain computer security
Examination of Federal and State law on computer crime
Comprehensive, up-to-date, easy-to-read

Product Details

ISBN-13:
9780750699389
Publisher:
Elsevier Science
Publication date:
12/01/1997
Pages:
260
Product dimensions:
0.75(w) x 6.00(h) x 9.00(d)

Table of Contents

Computer Protection and Legal Liability Risks; Reducing Liability Risks: Compliance Programs; Protecting Intellectual Property Rights; Trade Secrets; Trademarks and Patents; Copyrights; Information Privacy and Confidentiality; Records Management; Disaster Planning for Information Systems; Electronic Commerce; E-mail Policy Guide; Creating and Managing a Website; Computer Crime Law; Federal Sentencing Guidelines for Individuals and Organizations; Shoehorn Laws: Federal Statutes Used to Prosecute Computer-related Crime; State Computer Crime Statutes; Discovery and Computer Evidence; Technical Standards for Computing and Communications Security.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >