Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.
Labs:
Lab 1: Understanding the Importance of an IT Asset Inventory Lab 2: Creating a Privacy Impact Assessment Lab 3: Securing Credit Card Holder Data Lab 4: Analyzing and Comparing GLBA and HIPAA Lab 5: Cataloging Threats and Vulnerabilities Lab 6: Identifying the Scope of Your State’s Data Security Breach Notification Law Lab 7: Researching Cyberstalking and Cyberbullying Laws Lab 8: Analyzing Information Security Policies Lab 9: Conducting a Risk Assessment Lab 10: Preparing for Incident Response
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
Thoroughly revised and updated to address the many changes in this evolving field, the third edition of Legal and Privacy Issues in Information Security addresses the complex relationship between the law and the practice of information security. Information systems security and legal compliance are required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.
Labs:
Lab 1: Understanding the Importance of an IT Asset Inventory Lab 2: Creating a Privacy Impact Assessment Lab 3: Securing Credit Card Holder Data Lab 4: Analyzing and Comparing GLBA and HIPAA Lab 5: Cataloging Threats and Vulnerabilities Lab 6: Identifying the Scope of Your State’s Data Security Breach Notification Law Lab 7: Researching Cyberstalking and Cyberbullying Laws Lab 8: Analyzing Information Security Policies Lab 9: Conducting a Risk Assessment Lab 10: Preparing for Incident Response