Dr. S. R. Lasker Library Online Catalogue

Home      Library Home      Institutional Repository      E-Resources      MyAthens      EWU Home

Amazon cover image
Image from Amazon.com

Legal and privacy issues in information security / Joanna Lyn Grama.

By: Grama, Joanna LynMaterial type: TextTextPublication details: Massachusetts : Jones and Bartlett Learning, 2022. Edition: 3rd edDescription: xxiii, 525 pages : illustrations ; 24 cmISBN: 9781284207804Subject(s): Information storage and retrieval systems -- Law and legislation -- United States | Data protection -- Law and legislation -- United States | Information storage and retrieval systems -- Security measures -- Law and legislation -- United StatesDDC classification: 342.730858 Online resources: WorlCat Details
Contents:
Table of contents Intro Title Page Copyright Page Contents Dedication Preface Acknowledgments About the Author Chapter 1 Information Security Overview Why Is Information Security an Issue? What Is Information Security? What Is Confidentiality? What Is Integrity? What Is Availability? Basic Information Security Concepts Vulnerabilities Threats Risks Safeguards Choosing Safeguards What Are Common Information Security Concerns? Shoulder Surfing Social Engineering Phishing and Targeted Phishing Scams Malware Spyware and Keystroke Loggers Logic Bombs Backdoors Denial of Service Attacks What Are the Mechanisms That Ensure Information Security? Laws and Legal Duties Contracts Organizational Governance Data Protection Models U.S. National Security Information Voluntary Organizations Do Special Kinds of Data Require Special Kinds of Protection? Chapter Summary Key Concepts and Terms Chapter 1 Assessment Endnotes Chapter 2 Privacy Overview Why Is Privacy an Issue? What Is Privacy? Types of Personal Information How Is Privacy Different from Information Security? What Are the Sources of Privacy Law? Constitutional Law Federal Law Freedom of Information Act (1966) Privacy Act (1974) E-Government Act (2002) Electronic Communications Privacy Act (1986) The Wiretap Act (1968, amended) Census Confidentiality (1952) Mail Privacy Statute (1971) Cable Communications Policy Act (1984) Driver's Privacy Protection Act (1994) State Laws Common Law Intrusion Into Seclusion Portrayal in a False Light Appropriation of Likeness or Identity Public Disclosure of Private Facts Voluntary Agreements What Are Threats to Personal Data Privacy in the Information Age? Technology-Based Privacy Concerns Spyware Cookies, Web Beacons, and Clickstreams Wireless Technologies GPS Technology Security Breaches People-Based Privacy Concerns Social Networking Sites Online Data Gathering What Is Workplace Privacy? Telephone, Voicemail, and Email Monitoring Telephone and Voicemail Monitoring Email Monitoring Computer Use Monitoring Off-Duty Computer Monitoring Video Surveillance Monitoring Special Rules for Public Employees What Are General Principles for Privacy Protection in Information Systems? Privacy Policies International Privacy Laws Chapter Summary Key Concepts and Terms Chapter 2 Assessment Endnotes Chapter 3 The American Legal System The American Legal System Federal Government Legislative Branch Executive Branch Judicial Branch State Government Sources of American Law Common Law Code Law Constitutional Law How Does It All Fit Together? Types of Law Civil Criminal Administrative The Role of Precedent Regulatory Authorities
Summary: "The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers"--
Tags from this library: Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
Text Text Dr. S. R. Lasker Library, EWU
Reserve Section
Non-fiction 342.730858 GRL 2022 (Browse shelf(Opens below)) C-1 Checked out Not For Loan 19/09/2023 30971
Text Text Dr. S. R. Lasker Library, EWU
Circulation Section
Non-fiction 342.730858 GRL 2022 (Browse shelf(Opens below)) C-2 Available 30972
Text Text Dr. S. R. Lasker Library, EWU
Circulation Section
Non-fiction 342.730858 GRL 2022 (Browse shelf(Opens below)) C-3 Available 30973
Total holds: 0

Description based upon print version of record
What Is the Difference Between Compliance and Audit?

Includes bibliographical references (pages 495-512) and index.

Table of contents Intro
Title Page
Copyright Page
Contents
Dedication
Preface
Acknowledgments
About the Author
Chapter 1 Information Security Overview
Why Is Information Security an Issue?
What Is Information Security?
What Is Confidentiality?
What Is Integrity?
What Is Availability?
Basic Information Security Concepts
Vulnerabilities
Threats
Risks
Safeguards
Choosing Safeguards
What Are Common Information Security Concerns?
Shoulder Surfing
Social Engineering
Phishing and Targeted Phishing Scams
Malware
Spyware and Keystroke Loggers Logic Bombs
Backdoors
Denial of Service Attacks
What Are the Mechanisms That Ensure Information Security?
Laws and Legal Duties
Contracts
Organizational Governance
Data Protection Models
U.S. National Security Information
Voluntary Organizations
Do Special Kinds of Data Require Special Kinds of Protection?
Chapter Summary
Key Concepts and Terms
Chapter 1 Assessment
Endnotes
Chapter 2 Privacy Overview
Why Is Privacy an Issue?
What Is Privacy?
Types of Personal Information
How Is Privacy Different from Information Security? What Are the Sources of Privacy Law?
Constitutional Law
Federal Law
Freedom of Information Act (1966)
Privacy Act (1974)
E-Government Act (2002)
Electronic Communications Privacy Act (1986)
The Wiretap Act (1968, amended)
Census Confidentiality (1952)
Mail Privacy Statute (1971)
Cable Communications Policy Act (1984)
Driver's Privacy Protection Act (1994)
State Laws
Common Law
Intrusion Into Seclusion
Portrayal in a False Light
Appropriation of Likeness or Identity
Public Disclosure of Private Facts
Voluntary Agreements What Are Threats to Personal Data Privacy in the Information Age?
Technology-Based Privacy Concerns
Spyware
Cookies, Web Beacons, and Clickstreams
Wireless Technologies
GPS Technology
Security Breaches
People-Based Privacy Concerns
Social Networking Sites
Online Data Gathering
What Is Workplace Privacy?
Telephone, Voicemail, and Email Monitoring
Telephone and Voicemail Monitoring
Email Monitoring
Computer Use Monitoring
Off-Duty Computer Monitoring
Video Surveillance Monitoring
Special Rules for Public Employees What Are General Principles for Privacy Protection in Information Systems?
Privacy Policies
International Privacy Laws
Chapter Summary
Key Concepts and Terms
Chapter 2 Assessment
Endnotes
Chapter 3 The American Legal System
The American Legal System
Federal Government
Legislative Branch
Executive Branch
Judicial Branch
State Government
Sources of American Law
Common Law
Code Law
Constitutional Law
How Does It All Fit Together?
Types of Law
Civil
Criminal
Administrative
The Role of Precedent
Regulatory Authorities

"The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers"--

Information Studies Information Studies

Sagar Shahanawaz

There are no comments on this title.

to post a comment.