Information security law: the emerging standard for corporate compliance
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2008
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references Introduction; chapter 1: security basics: the legal perspective; chapter 2: legal response to security; chapter 3: the general duty to provide security; chapter 4: the legal standard for compliance; chapter 5: developing a compliant security program; chapter 6: security controls to consider; chapter 7: the role of standards; chapter 8: security breach notification; appendix In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data. Information security law: The emerging standard for corporate compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them. -- Publisher description |
Beschreibung: | 1 Online-Ressource (182 pages) |
ISBN: | 1282529013 1905356676 9781282529014 9781905356676 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043067183 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 1282529013 |9 1-282-52901-3 | ||
020 | |a 1905356676 |c electronic bk. |9 1-905356-67-6 | ||
020 | |a 9781282529014 |9 978-1-282-52901-4 | ||
020 | |a 9781905356676 |c electronic bk. |9 978-1-905356-67-6 | ||
035 | |a (OCoLC)609854829 | ||
035 | |a (DE-599)BVBBV043067183 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 343.0999 | |
100 | 1 | |a Smedinghoff, Thomas J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Information security law |b the emerging standard for corporate compliance |c Thomas J. Smedinghoff |
264 | 1 | |a Ely |b IT Governance Pub. |c 2008 | |
300 | |a 1 Online-Ressource (182 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
500 | |a Introduction; chapter 1: security basics: the legal perspective; chapter 2: legal response to security; chapter 3: the general duty to provide security; chapter 4: the legal standard for compliance; chapter 5: developing a compliant security program; chapter 6: security controls to consider; chapter 7: the role of standards; chapter 8: security breach notification; appendix | ||
500 | |a In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data. Information security law: The emerging standard for corporate compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them. -- Publisher description | ||
650 | 4 | |a Electronic commerce / Law and legislation | |
650 | 4 | |a Data protection / Law and legislation | |
650 | 4 | |a Computer security / Law and legislation | |
650 | 7 | |a LAW / Computer & Internet |2 bisacsh | |
650 | 7 | |a Computer security / Law and legislation |2 fast | |
650 | 7 | |a Corporation law |2 fast | |
650 | 7 | |a Data protection / Law and legislation |2 fast | |
650 | 4 | |a Recht | |
650 | 4 | |a Corporation law | |
650 | 4 | |a Computer security |x Law and legislation | |
650 | 4 | |a Data protection |x Law and legislation | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-905356-66-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-905356-66-9 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028491375 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175447241523200 |
---|---|
any_adam_object | |
author | Smedinghoff, Thomas J. |
author_facet | Smedinghoff, Thomas J. |
author_role | aut |
author_sort | Smedinghoff, Thomas J. |
author_variant | t j s tj tjs |
building | Verbundindex |
bvnumber | BV043067183 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)609854829 (DE-599)BVBBV043067183 |
dewey-full | 343.0999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.0999 |
dewey-search | 343.0999 |
dewey-sort | 3343.0999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03829nmm a2200541zc 4500</leader><controlfield tag="001">BV043067183</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282529013</subfield><subfield code="9">1-282-52901-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1905356676</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-905356-67-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282529014</subfield><subfield code="9">978-1-282-52901-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781905356676</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-905356-67-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609854829</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043067183</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.0999</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Smedinghoff, Thomas J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security law</subfield><subfield code="b">the emerging standard for corporate compliance</subfield><subfield code="c">Thomas J. Smedinghoff</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (182 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction; chapter 1: security basics: the legal perspective; chapter 2: legal response to security; chapter 3: the general duty to provide security; chapter 4: the legal standard for compliance; chapter 5: developing a compliant security program; chapter 6: security controls to consider; chapter 7: the role of standards; chapter 8: security breach notification; appendix</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data. Information security law: The emerging standard for corporate compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them. -- Publisher description</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW / Computer & Internet</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Corporation law</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection / Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Corporation law</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-905356-66-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-905356-66-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028491375</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043067183 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:26Z |
institution | BVB |
isbn | 1282529013 1905356676 9781282529014 9781905356676 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028491375 |
oclc_num | 609854829 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (182 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Smedinghoff, Thomas J. Verfasser aut Information security law the emerging standard for corporate compliance Thomas J. Smedinghoff Ely IT Governance Pub. 2008 1 Online-Ressource (182 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references Introduction; chapter 1: security basics: the legal perspective; chapter 2: legal response to security; chapter 3: the general duty to provide security; chapter 4: the legal standard for compliance; chapter 5: developing a compliant security program; chapter 6: security controls to consider; chapter 7: the role of standards; chapter 8: security breach notification; appendix In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data. Information security law: The emerging standard for corporate compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them. -- Publisher description Electronic commerce / Law and legislation Data protection / Law and legislation Computer security / Law and legislation LAW / Computer & Internet bisacsh Computer security / Law and legislation fast Corporation law fast Data protection / Law and legislation fast Recht Corporation law Computer security Law and legislation Data protection Law and legislation Erscheint auch als Druck-Ausgabe, Paperback 1-905356-66-8 Erscheint auch als Druck-Ausgabe, Paperback 978-1-905356-66-9 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095 Aggregator Volltext |
spellingShingle | Smedinghoff, Thomas J. Information security law the emerging standard for corporate compliance Electronic commerce / Law and legislation Data protection / Law and legislation Computer security / Law and legislation LAW / Computer & Internet bisacsh Computer security / Law and legislation fast Corporation law fast Data protection / Law and legislation fast Recht Corporation law Computer security Law and legislation Data protection Law and legislation |
title | Information security law the emerging standard for corporate compliance |
title_auth | Information security law the emerging standard for corporate compliance |
title_exact_search | Information security law the emerging standard for corporate compliance |
title_full | Information security law the emerging standard for corporate compliance Thomas J. Smedinghoff |
title_fullStr | Information security law the emerging standard for corporate compliance Thomas J. Smedinghoff |
title_full_unstemmed | Information security law the emerging standard for corporate compliance Thomas J. Smedinghoff |
title_short | Information security law |
title_sort | information security law the emerging standard for corporate compliance |
title_sub | the emerging standard for corporate compliance |
topic | Electronic commerce / Law and legislation Data protection / Law and legislation Computer security / Law and legislation LAW / Computer & Internet bisacsh Computer security / Law and legislation fast Corporation law fast Data protection / Law and legislation fast Recht Corporation law Computer security Law and legislation Data protection Law and legislation |
topic_facet | Electronic commerce / Law and legislation Data protection / Law and legislation Computer security / Law and legislation LAW / Computer & Internet Corporation law Recht Computer security Law and legislation Data protection Law and legislation |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391095 |
work_keys_str_mv | AT smedinghoffthomasj informationsecuritylawtheemergingstandardforcorporatecompliance |