Data protection strategy: implementing data protection compliance
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
Sweet & Maxwell/Thomson Reuters
2012
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Includes index. |
Beschreibung: | xxxii, 450 p. 24 cm |
ISBN: | 0414026748 9780414026742 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV041258235 | ||
003 | DE-604 | ||
005 | 20130926 | ||
007 | t | ||
008 | 130906s2012 xxk |||| 00||| eng d | ||
020 | |a 0414026748 |9 0-414-02674-8 | ||
020 | |a 9780414026742 |9 978-0-414-02674-2 | ||
035 | |a (OCoLC)859392645 | ||
035 | |a (DE-599)BVBBV041258235 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxk |c GB | ||
049 | |a DE-703 | ||
050 | 0 | |a KD1957.C65 | |
084 | |a PZ 4900 |0 (DE-625)141185: |2 rvk | ||
100 | 1 | |a Morgan, Richard |e Verfasser |4 aut | |
245 | 1 | 0 | |a Data protection strategy |b implementing data protection compliance |c by Richard Morgan and Ruth Boardman |
250 | |a 2. ed. | ||
264 | 1 | |a London |b Sweet & Maxwell/Thomson Reuters |c 2012 | |
300 | |a xxxii, 450 p. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index. | ||
610 | 2 | 4 | |a Great Britain |t Data Protection Act 1998 |
650 | 4 | |a Recht | |
650 | 4 | |a Data protection |x Law and legislation |z Great Britain | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
651 | 4 | |a Großbritannien | |
651 | 7 | |a Großbritannien |0 (DE-588)4022153-2 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Großbritannien |0 (DE-588)4022153-2 |D g |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Boardman, Ruth |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Bayreuth |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-026232116 |
Datensatz im Suchindex
_version_ | 1804150717096656896 |
---|---|
adam_text | Contents
Tables
Table of Cases
xvii
Table of Statutes
xxi
Table of Statutory Instruments
xxvii
Table of European Legislation
xxix
Table of Information Commissioner s Guidance
xxxi
Part I Introduction to Data Protection
1
1
How to use this Book
3
2
Processing Data
6
2.1
Introduction
6
2.2
Data
7
2.2.1
Personal data
7
2.2.2
Sensitive personal data
9
2.2.3
Relevant records
9
2.3
Processing
10
2.4
The players
11
2.4.1
Data subjects
11
2.4.2
Data controllers
11
2.4.3
Data processors
14
2.4.4
The Information Commissioner
16
2.4.5
Appeals from the Commissioner s rulings
17
2.4.6
The European Union and the Article
29
Working
Party
18
2.5
The new draft Regulation and Directive
19
3
Consequences of Failure
20
3.1
Introduction
21
3.2
Criminal offences
21
3.2.1
Offences by the data controller, its officers and
managers
21
3.2.2
Notification-related offences
22
3.2.3
Unlawful ohrainine or disclosure of Dersonal data
23
VII
viii
Contents
3.2.4
Subject-access related offences
26
3.2.5
Offences relating to the Commissioner s powers
27
3.2.6
Procedures relating to offences
28
3.3
Legal actions
28
3.3.1
Legal actions by individuals
28
3.3.1.1
Legal action in the courts of the UK
28
3.3.1.2
Legal action in the European courts:
General
32
3.3.1.3
Legal action in the European Court of
Human Rights
33
3.3.1.4
Legal action in the Court of Justice of the
European Union
34
3.4
Enforcement by the Information Commissioner
34
3.4.1
Introduction
34
3.4.2
Monetary penalties
35
3.4.3
Provisions relating to communications service
providers
41
3.4.3.1
Introduction
41
3.4.3.2
Powers to require provision of
information and to audit
42
3.4.3.3
Enforcement relating to data breaches
42
3.4.4
Enforcement Notices
43
3.4.5
Assessment
43
3.4.5.1
Requests for assessment
43
3.4.5.2
Assessment Notices
45
3.4.5.3
Voluntary assessment
48
3.4.6
Information Notices
50
3.4.7
Undertakings
51
3.4.8
Summary of rights of entry and inspection
51
3.5
Other consequences of failure
52
3.5.1
The Advertising Standards Authority
52
3.5.2
Bad publicity
53
3.6
The new draft Regulation and Directive
54
Partii
The Data Audit
55
4
Preparations for Audit
57
4.1
Role and scope of audit
57
4.2
Audit or assessment
58
4.3
Selection of auditors
59
4.4
Procedures to put in place before the audit
61
5
The Audit
63
5.1
Records and their processing
63
Contents
ix
5.2
Data subjects
5.3
Files
5.3.1
Computer files
5.3.2
Manual files
5.3.3
Photographic and video files
5.3.3.1
Scanned documents
5.3.3.2
Photographs and films
5.3.3.3
CCTV footage
5.3.4
Audio files
5.4
Processing
5.4.1
General
5.4.2
Processing data abroad
5.5
Checklist of audit questions
5.6
Interpreting the results of the audit
65
67
67
69
73
73
73
74
76
77
77
78
78
81
5.7
The new draft Regulation and Directive
82
Annex: The ICO Quick guide to understanding the
DPA
definition of
relevant filing systems
83
Part III Data Protection Compliance
85
6
Basic Compliance
1 :
The Strategy, its Promulgation and
Enforcement
87
6.1
Strategy
87
6.2
The Data Protection Officer
88
6.3
Policy and procedures
89
6.3.1
Policy
89
6.3.2
Procedures
90
6.3.2.1
Data analysis
90
6.3.2.2
The Commissioner s Codes
93
6.3.2.3
Other advice
96
6.3.2.4
Privacy Impact Assessment
96
6.3.2.5
Checklist for procedures
97
6.4
Contracts
98
6.4.1
Contracts and personal data
98
6.4.2
Contracts with data subjects
99
6.4.3
Data processor contracts
99
6.4.4
Data sharing contracts
100
6.5
Promulgation
103
6.5.1
A climate of compliance
103
6.5.2
Training
103
6.5.3
Staff notices and intranets
104
6.5.4
Staff handbooks
104
6.5.5
Contracts of employment
104
Contents
6.6
Enforcement
105
6.7
The new draft Regulation and Directive
106J
7
Basic
Compliance
2:
Notification
107
7.1
Notification
107
7.1.1
The obligation to notify
107
7.2
Exemptions
108
7.2.1
Introduction
108
7.2.2
Manual records
109
7.2.3
Data processors
109
7.2.4
Personal, family and domestic use
110
7.2.5
Standard business and not-for-profit
processing
110
7.2.5.1
Introduction
110
7.2.5.2
Staff administration
112
7.2.5.3
Advertising, marketing and public
relations
112
7.2.5.4
Accounts and record keeping
113
7.2.5.5
Non-profit-making organisations
113
7.2.6
Public registers
114
7.2.7
National security
114
7.3
Practicalities
1:
How to notify
114
7.4
Practicalities
2:
Keeping the notification up to date
118
1 7.5
The new draft Regulation and Directive
119
5
Principle
1 :
Fairly and Lawfully
120
8.1
Introduction
120
8.2
Fairness
121
8.2.1
Fairness and the individual
121
8.2.2
Deception
122
8.2.3
The Privacy Notice
122
8.2.3.1
The information to be provided
122
8.2.3.2
Timing of the notice
125
8.2.3.3
Exemptions
126
8.3
Pre-conditions to processing
130
8.3.1
Schedule
2
and Schedule
3
130
8.3.2
Schedule
2
conditions
130
8.3.3
Schedule
3
conditions
132
8.3.3.1
Introduction
132
8.3.3.2
The Schedule
3
conditions
133
8.3.4
Necessity
139
8.3.5
Consent
139
8.4
Lawfulness
143
8.4.1
General considerations
143
Contents
xi
8.4.2
Use of telephones, faxes, emails and text messages
for direct marketing
145
8.4.2.1
Direct marketing by telephone
145
8.4.2.2
Direct marketing by fax
145
8.4.2.3
Automated calling systems
145
8.4.2.4
Direct marketing by email and text
messages
146
8.4.3
Confidential information
149
8.5
Practical conclusions
150
8.6
The new draft Regulation and Directive
151
9
Principles
2
to
5:
Data Quality
152
9.1
Introduction
152
9.2 2nd
Principle: The purposes
152
9.3 3rd
Principle: Adequate
154
9.4
4th Principle: Accurate and up-to-date
155
9.5
5th Principle: No longer than necessary
156
9.5.1
The end of processing
156
9.5.2
Archives
161
9.5.3
Disposal of old equipment
163
9.6
The purposes: A checklist
164
9.7
The new draft Regulation and Directive
165
Ί0
Principle
6:
Data Subjects Rights
166
10.1
Data subjects rights
167
10.2
Right of access
169
10.2.1
Overview of access rights
169
10.2.2
Initial response to a subject-access request
169
10.2.2.1
Introduction
169
10.2.2.2
Form of subject-access requests
170
10.2.2.3
Requests made to data processors
170
10.2.2.4
Identification of the data subject
171
10.2.2.5
Fees
172
10.2.2.6
Requests from third parties
173
10.2.2.7
Finding the data
174
10.2.2.8
Disproportionate effort
176
10.2.3
Reviewing the information
177
10.2.4
Main exemptions
181
10.2.4.1
Repeat requests
181
10.2.4.2
Confidential references
181
10.2.4.3
Management forecasts
182
10.2.4.4
Negotiations
182
10.2.4.5
Legal professional privilege
183
10.2.4.6
Crime and taxation
183
xii
Contents
10.2.5
Exemptions involving privacy rights or causing
damage or distress
183
10.2.5.1
Introduction
183
10.2.5.2
Third-party information
183
10.2.5.3
Serious harm
186
10.2.6
Issuing the information to the applicant
186
10.3
Correction and erasure
187
10.4
Right to prevent direct marketing
189
10.5
Right to prevent processing causing damage or distress
190
10.6
Automated decision-taking rights
192
10.7
The new draft Regulation and Directive
194]
11
Principle
7:
Security
195
11.1
7th Principle and data loss
195
11.2
Security assessment
196
11.2.1
Assessment of the data
196
11.2.2
Security measures
198
11.3
Employee assessment
200
11.4
Data processors
201
11.4.1
Who are data processors?
201
11.4.2
Data processor selection
202
11.4.3
Data processor contracts
202
11.5
Sharing data with data controllers
204
11.6
Data breach
204
11.6.1
Introduction
204
11.6.2
Breach management
204
11.6.3
Breach notification: general
206
11.6.4
Breach notification: communications service
providers
207
11.6.5
Service providers compliance
209
11.7
The new draft Regulation and Directive
210
12
Principle
8:
Transborder
Dataflows
211
12.1
The prohibition on transfer
211
12.2
Types of data transfer
212
12.3
Approaches to data transfer
215
12.3.1
The main exemptions
215
12.4
Transfers to countries where there is adequate protection
216
12.4.1
Countries recognised as adequate
216
12.4.1.2
Safe Harbor
216
12.4.1.3
Personal Information Protection and
Electronic Documents Act
217
12.4.2
Other adequate transfers
217
12.5
Contractual necessity
219
Contents
xiii
12.6
Data subject s consent
220
12.7
Data transfer contracts
221
12.7.1
Standard Contractual Clauses and Model Contracts
221
12.7.1.1
Introduction
221
12.7.1.2
Controller to Controller clauses
222
12.7.1.3
Controller to Processor clauses
223
12.7.2
Data processor contracts
224
12.7.3
Other contract terms
224
12.8
Binding Corporate Rules
225
12.9
Other exemptions
228
12.10
Conclusions
229
12.11
The new draft Regulation and Directive
230
13
Special Cases
231
13.1
Introduction
232
13.2
Special types of data
232
13.2.1
Accessible records
232
13.2.2
Health records and other health data
233
13.2.3
Educational records
235
13.2.4
Housing and social services records
236
13.2.5
Freedom of Information Act data
237
13.3
Exemptions
238
13.3.1
Introduction
238
13.3.2
Substantial exemptions
239
13.3.2.1
Introduction
239
13.3.2.2
National security
239
13.3.2.3
Crime and taxation
240
13.3.2.4
Journalistic, literary and artistic purposes
242
13.3.2.5
Research, history and statistics
249
13.3.2.6
Publicly available information
251
13.3..2.7
Domestic purposes
251
13.3.2.8
Parliamentary privilege
252
13.3.3
Exemptions from the subject information provisions
252
13.3.3.1
Introduction
252
13.3.3.2
Regulatory activity
252
13.3.3.3
Armed forces
253
13.3.3.4
Judicial appointments and honours
253
13.3.3.5
Crown employment
253
13.3.3.6
Corporate finance
253
13.3.3.7
Negotiations
254
13.3.3.8
Legal professional privilege
254
13.3.3.9
Other exemptions
254
13.3.4
Exemptions from subject access
254
13.3.4.1
Examination marks
254
xiv
Contents
13.3.4.2
Examination papers
255
13.3.4.3
Self-incrimination
255
13.3.4.4
Other exemptions
255
13.3.5
Exemptions from the non-disclosure provisions
255
13.4
The new draft Regulation and Directive
25б|
14
Social and Technical Developments affecting Data Protection
257
14.1
Introduction
257
14.2
Email
258
14.2.1
The contrast with ordinary mail
258
14.2.2
Why email is different
260
14.2.2.1
Business emails
260
14.2.2.2
Private emails
262
14.2.2.3
Employer s obligations
264
14.2.3
Monitoring emails
267
14.2.3.1
Why monitor emails
267
14.3.2.2
How to monitor emails
268
14.3.2.3
Legal aspects of email monitoring
269
14.3
Internet usage and voicemail
273
14.4
Home working
274
14.5
Own devices
275
14.6
Social Networking
111
14.6.1
Introduction
111
14.6.2
Privacy settings
278
14.6.3
Children
279
14.6.4
Social Networking in business
281
14.7
Communications policy checklists
282
14.8
Cookies
285
14.8.1
Introduction and the
2003
Privacy Regulations
285
14.8.2
The
2011
Regulations
286
14.9
The new draft Regulation and Directive
291
Part IV Ongoing Compliance
293
15
Maintaining Data Protection Compliance
295
15.1
The changing law
295
15.2
The changing organisation
296
15.3
The Data Protection Officer s report to the Board
298
15.4
The new draft Regulation and Directive
299
Part V Checklist for the Data Protection Officer and others
303
í
6
Checklist for the Data Protection Officer and others
305
16.1
Introduction
305
Contents
xv
16.2
Relations with the Board
306
16.3
Relations with the Human Resources department
307
16.4
Relations with the IT department
308
16.5
Relations with the webmaster
311
16.6
Relations with Corporate Security
311
16.7
Relations with the Legal department
312
16.8
Relations with Direct Marketing and Publicity
313
16.9
Relations with foreign subsidiaries and partners
314
16.10
Relations with the Information Commissioner
315
16.11
The new draft Regulation and Directive
315
Controller
B.I
Introduction
B.2
Precedent clauses
Annex
1:
Instructions
Annex
2:
Security measures
Annex
3:
Records
Appendices
316
A Why Data Protection?
316
A.I Why the legislation?
316
A.2 Privacy, confidence and human rights
316
A.3 The international dimension
319
A.4 Summary
321
ß
Precedent Contract Clauses for Duties of Data Processor and Data
323
323
323
325
325
325
С
Precedent for Fair Obtaining Warranty
326
C.I Introduction
326
C.2 Fair obtaining clause
327
D
Contracts of Employment
329
D.I Data protection
329
D.2 Electronic communications
330
D.3 Equipment provided for working off the company s
premises
331
E Data
Protection Policy
—
Subject Access
333
E.1 Scope
333
E.2 Subject access process flowchart
335
Annex
1:
Pro-forma
subject access request form
336
Annex
2:
Locating all information relevant to a subject access
request
339
xvi
Contents
Annex 2A:
Pro-forma
access request memo to data protection
co-ordinators
341
Annex 2B:
Pro-forma
access request letter to data processors
343
Annex
3:
Third-party information procedures
344
Annex
ЗА:
Pro-forma
paragraph to be included in letter to applicant
347
Annex 3B:
Pro-forma
letter to third party
348
Annex
4:
Health information procedures
349
Annex 4A:
Pro-forma
paragraph to be included in letter to applicant
350
Annex 4B:
Pro-forma
letter to medical practitioner
351
Annex
5:
Exempt information procedures
352
Annex
6:
Pro-forma
letter to applicant enclosing subject access
papers
353
F
Precedent Letters on Automated Decision-taking
354
F.I Introduction
354
F.2
Biometrie
measurement
354
F.3 Job application form processing
355
G
Precedent Letters on Direct Marketing
357
H
General Data Protection Policy
360
H.I Scope
360
H.2 Overview of the Data Protection Act
360
H.3 The eight Data Protection Principles
362
H.4 Consequences of non-compliance
364
H.5 Any queries?
364
H.6 Document information
365
Annex
1
Group Data Protection Officer and Co-ordinators
365
Annex
2
Other policies which include data protection compliance
requirements
365
Annex
3
Departmental data protection policies
366
I New Draft Regulation
___________
36l
J
New Draft Directive
412
Index
431
DATA PROTECTION STRATEGY
IMPLEMENTING DATA PROTECTION COMPLIANCE
Richard Morgan and Ruth
Boardman
Data Protection Strategy provides a fully revised commentary on the essential issues for data
controllers: the grounds for processing, the need for compliance and the practical steps in
involved in formulating a cohesive and effective data protection policy within an organisation.
The structure of the book enables a complex subject to be grasped easily and is ideal for both
busy practitioners and those new to the subject. You ll find a wealth of hands-on guidance,
checklists and precedent material to help you establish data protection compliance.
•
Goes through how to set up a data strategy and the dependent corporate structure and procedures
•
Examines the processing of personal data, sensitive material and other relevant records
•
Looks at the key roles in Data Protection
•
Details the consequences of compliance failures, including criminal charges and
Commissioner s powers
•
Outlines the structure of Data Audits, both how to prepare and the Audit itself
•
Looks at the controversial new rules on Cookies
•
Explains how to comply with data protection principles
•
Gives advance notice of new legislation from the
EU
which could potentially significantly
change Data Protection legislation and practice in the UK and throughout the
EU
Richard Morgan FBCS, CITP, is an independent IT Consultant and was previously the Computer
Officer for both Houses of Parliament. He lectures widely on all aspects of IT and Law and is co-author
of Morgan
&
Burden on Computer Contracts 8th edition, published by Sweet
&
Maxwell.
Ruth
Boardman
is a Partner at Bird
&
Bird and co-Head of the firm s international privacy
practice. She is a Member of the European Advisory Board of the International Association of
Privacy Professionals.
|
any_adam_object | 1 |
author | Morgan, Richard Boardman, Ruth |
author_facet | Morgan, Richard Boardman, Ruth |
author_role | aut aut |
author_sort | Morgan, Richard |
author_variant | r m rm r b rb |
building | Verbundindex |
bvnumber | BV041258235 |
callnumber-first | K - Law |
callnumber-label | KD1957 |
callnumber-raw | KD1957.C65 |
callnumber-search | KD1957.C65 |
callnumber-sort | KD 41957 C65 |
callnumber-subject | KD - United Kingdom and Ireland |
classification_rvk | PZ 4900 |
ctrlnum | (OCoLC)859392645 (DE-599)BVBBV041258235 |
discipline | Rechtswissenschaft |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01948nam a2200469zc 4500</leader><controlfield tag="001">BV041258235</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130926 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130906s2012 xxk |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0414026748</subfield><subfield code="9">0-414-02674-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780414026742</subfield><subfield code="9">978-0-414-02674-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859392645</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041258235</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KD1957.C65</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4900</subfield><subfield code="0">(DE-625)141185:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Morgan, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data protection strategy</subfield><subfield code="b">implementing data protection compliance</subfield><subfield code="c">by Richard Morgan and Ruth Boardman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">Sweet & Maxwell/Thomson Reuters</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxii, 450 p.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">Great Britain</subfield><subfield code="t">Data Protection Act 1998</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">Great Britain</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Großbritannien</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Großbritannien</subfield><subfield code="0">(DE-588)4022153-2</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Boardman, Ruth</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bayreuth</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026232116</subfield></datafield></record></collection> |
geographic | Großbritannien Großbritannien (DE-588)4022153-2 gnd |
geographic_facet | Großbritannien |
id | DE-604.BV041258235 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:43:21Z |
institution | BVB |
isbn | 0414026748 9780414026742 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026232116 |
oclc_num | 859392645 |
open_access_boolean | |
owner | DE-703 |
owner_facet | DE-703 |
physical | xxxii, 450 p. 24 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Sweet & Maxwell/Thomson Reuters |
record_format | marc |
spelling | Morgan, Richard Verfasser aut Data protection strategy implementing data protection compliance by Richard Morgan and Ruth Boardman 2. ed. London Sweet & Maxwell/Thomson Reuters 2012 xxxii, 450 p. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes index. Great Britain Data Protection Act 1998 Recht Data protection Law and legislation Great Britain Datenschutz (DE-588)4011134-9 gnd rswk-swf Großbritannien Großbritannien (DE-588)4022153-2 gnd rswk-swf Großbritannien (DE-588)4022153-2 g Datenschutz (DE-588)4011134-9 s DE-604 Boardman, Ruth Verfasser aut Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Bayreuth application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Morgan, Richard Boardman, Ruth Data protection strategy implementing data protection compliance Great Britain Data Protection Act 1998 Recht Data protection Law and legislation Great Britain Datenschutz (DE-588)4011134-9 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4022153-2 |
title | Data protection strategy implementing data protection compliance |
title_auth | Data protection strategy implementing data protection compliance |
title_exact_search | Data protection strategy implementing data protection compliance |
title_full | Data protection strategy implementing data protection compliance by Richard Morgan and Ruth Boardman |
title_fullStr | Data protection strategy implementing data protection compliance by Richard Morgan and Ruth Boardman |
title_full_unstemmed | Data protection strategy implementing data protection compliance by Richard Morgan and Ruth Boardman |
title_short | Data protection strategy |
title_sort | data protection strategy implementing data protection compliance |
title_sub | implementing data protection compliance |
topic | Great Britain Data Protection Act 1998 Recht Data protection Law and legislation Great Britain Datenschutz (DE-588)4011134-9 gnd |
topic_facet | Great Britain Data Protection Act 1998 Recht Data protection Law and legislation Great Britain Datenschutz Großbritannien |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026232116&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT morganrichard dataprotectionstrategyimplementingdataprotectioncompliance AT boardmanruth dataprotectionstrategyimplementingdataprotectioncompliance |