Information Security: Managing the Legal Risks
CCH Australia Limited, 2009 - 374 psl.
This book provides users with essential facts on this major new area of legal risk for businesses and government agencies. This book contains a primer on information security, an analysis of the legal exposures that can flow from security breaches, and practical advice on the management of those risks.
Ką žmonės sako - Rašyti recenziją
Neradome recenzijų įprastose vietose.
What is information security?
Inside jobs and data leakage
The tort of negligence
Privacy at common law
Other liability scenarios
Introduction to Part 3
policies and procedures
Reflections predictions and next steps
Trade Practices Act related legislation
Kiti leidimai - Peržiūrėti viską
access rights accessed September 2009 acquiring bank agreements apply assets attack Australian botnet breach of confidence cause of action Chapter claim COBIT common law companys compliance computer systems conduct confidential information contract corporate courts credit card Cybercrime data centre data leakage data storage devices devices documented duty duty of care employee encryption ensure example exploit firewall hacker hacking identified identity theft implement information security breaches information security regime infrastructure issuing banks Jane Doe laptop liability malware organisation organisations particularly password patch management PCI DSS Perre v Apand personal information plaintiff policies and procedures policy set potential practical Pty Ltd pure economic loss reasonable regard requirements result risk management scenario section 52 sensitive server Snide specific staff standard theft or leakage third party tort tort of negligence USB stick vicarious liability vulnerabilities Whilst