Legal and privacy issues in information security / Joanna Lyn Grama.
Material type: TextPublication details: Massachusetts : Jones and Bartlett Learning, 2022. Edition: 3rd edDescription: xxiii, 525 pages : illustrations ; 24 cmISBN: 9781284207804Subject(s): Information storage and retrieval systems -- Law and legislation -- United States | Data protection -- Law and legislation -- United States | Information storage and retrieval systems -- Security measures -- Law and legislation -- United StatesDDC classification: 342.730858 Online resources: WorlCat DetailsItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
Text | Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 342.730858 GRL 2022 (Browse shelf(Opens below)) | C-1 | Checked out Not For Loan | 19/09/2023 | 30971 | |
Text | Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 342.730858 GRL 2022 (Browse shelf(Opens below)) | C-2 | Available | 30972 | ||
Text | Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 342.730858 GRL 2022 (Browse shelf(Opens below)) | C-3 | Available | 30973 |
Browsing Dr. S. R. Lasker Library, EWU shelves, Shelving location: Reserve Section Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
342.5492 MOS 2014 সংবিধান ও গণতন্ত্র / | 342.6482 CON 1994 The Construction of authorship : | 342.6482 CON 1994 The Construction of authorship : | 342.730858 GRL 2022 Legal and privacy issues in information security / | 342.730858 SEP 2011 Privacy, security and information management : | 342 ISI 2015 Interpretation of statutes and documents / | 342 PUB 2007 Public choice and public law / |
Description based upon print version of record
What Is the Difference Between Compliance and Audit?
Includes bibliographical references (pages 495-512) and index.
Table of contents Intro
Title Page
Copyright Page
Contents
Dedication
Preface
Acknowledgments
About the Author
Chapter 1 Information Security Overview
Why Is Information Security an Issue?
What Is Information Security?
What Is Confidentiality?
What Is Integrity?
What Is Availability?
Basic Information Security Concepts
Vulnerabilities
Threats
Risks
Safeguards
Choosing Safeguards
What Are Common Information Security Concerns?
Shoulder Surfing
Social Engineering
Phishing and Targeted Phishing Scams
Malware
Spyware and Keystroke Loggers Logic Bombs
Backdoors
Denial of Service Attacks
What Are the Mechanisms That Ensure Information Security?
Laws and Legal Duties
Contracts
Organizational Governance
Data Protection Models
U.S. National Security Information
Voluntary Organizations
Do Special Kinds of Data Require Special Kinds of Protection?
Chapter Summary
Key Concepts and Terms
Chapter 1 Assessment
Endnotes
Chapter 2 Privacy Overview
Why Is Privacy an Issue?
What Is Privacy?
Types of Personal Information
How Is Privacy Different from Information Security? What Are the Sources of Privacy Law?
Constitutional Law
Federal Law
Freedom of Information Act (1966)
Privacy Act (1974)
E-Government Act (2002)
Electronic Communications Privacy Act (1986)
The Wiretap Act (1968, amended)
Census Confidentiality (1952)
Mail Privacy Statute (1971)
Cable Communications Policy Act (1984)
Driver's Privacy Protection Act (1994)
State Laws
Common Law
Intrusion Into Seclusion
Portrayal in a False Light
Appropriation of Likeness or Identity
Public Disclosure of Private Facts
Voluntary Agreements What Are Threats to Personal Data Privacy in the Information Age?
Technology-Based Privacy Concerns
Spyware
Cookies, Web Beacons, and Clickstreams
Wireless Technologies
GPS Technology
Security Breaches
People-Based Privacy Concerns
Social Networking Sites
Online Data Gathering
What Is Workplace Privacy?
Telephone, Voicemail, and Email Monitoring
Telephone and Voicemail Monitoring
Email Monitoring
Computer Use Monitoring
Off-Duty Computer Monitoring
Video Surveillance Monitoring
Special Rules for Public Employees What Are General Principles for Privacy Protection in Information Systems?
Privacy Policies
International Privacy Laws
Chapter Summary
Key Concepts and Terms
Chapter 2 Assessment
Endnotes
Chapter 3 The American Legal System
The American Legal System
Federal Government
Legislative Branch
Executive Branch
Judicial Branch
State Government
Sources of American Law
Common Law
Code Law
Constitutional Law
How Does It All Fit Together?
Types of Law
Civil
Criminal
Administrative
The Role of Precedent
Regulatory Authorities
"The third edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers"--
Information Studies Information Studies
Sagar Shahanawaz
There are no comments on this title.