Information Security Law: Control of Digital Assets
For most organizations, an effective information security policy is vitally important. In some instances, it is a legal requirement. Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them. It is filled with practical advice on all aspects of implementing effective internal controls, protecting user privacy, preventing computer crimes, leveraging intellectual property and avoiding regulatory scrutiny. Written for lawyers, compliance officers, network administrators, and anyone who oversees the preservation and use of networked data, this important book examines such topics as: ensuring the accuracy of data used to generate financial reports; protecting consumers' personally identifiable information; the Gramm-Leach-Bliley Act's privacy and safeguards rules; HIPAA restrictions on the use of medical information; state and federal remedies for attacks on computer systems; avoiding liability when monitoring computer systems; and more. Whether your responsibilities include securing networks or creating an adequate plan for responding to security incidents, Information Security Law: Control of Digital Assets will make a difficult job much easier.
64 pages matching Government in this book
Results 1-3 of 64
What people are saying - Write a review
We haven't found any reviews in the usual places.
2 Congress 1228
Information Security Policies
16 other sections not shown
accepted accounting principles amended by adding apply appropriate authority Board business associate codified in 15 consumer reporting agency covered entity Credit Reporting Act credit score customer information definition Director disclose disclosure discussion of 15 discussion of Pub electronic protected health employee end the following enforcement Fair Credit Reporting Federal Trade Commission financial institution financial reporting fmancial furnish Government Gramm-Leach-Bliley Act Guidelines health plan HIPAA identifiable identity theft implement information security program information systems infra internal control issuer July 22 last visited April liability nonpublic personal information notice notify paragraph policies and procedures protected health information public accounting firm purposes pursuant to Pub registered public accounting regulations relating Reporting Act 15 request Sarbanes-Oxley Act Securities Exchange Act standards Stat subchapter subparagraph subpart subsection sumer supra t]he term tion title 44 transaction unauthorized access United States Code violation