Managing Legal and Security Risks in Computing and Communications

Front Cover
Butterworth-Heinemann, 1998 - Business & Economics - 246 pages
0 Reviews

The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations.

Managing Legal and Security Risks in Computing and Communications will: 

  • Help you quickly locate pertinent laws
  • Provide guidance on the laws
  • Present a legal reference for developing training material
  • Help you foster a continuing dialog with legal counsel


  • Detailed discussion of the laws requiring organizations to retain computer security
  • Examination of Federal and State law on computer crime
  • Comprehensive, up-to-date, easy-to-read
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Computer Protection and Legal Liability Risks
1
Reducing Liability Risks Compliance Programs
23
Protecting Intellectual Property Rights
33
Trade Secrets
39
Trademarks and Patents
51
Copyrights
61
Information Privacy and Confidentiality
77
Records Management
91
Creating and Managing a Web Site Intellectual Property Considerations
145
Computer Crime Law
155
Federal Sentencing Guidelines for Individuals and Organizations
173
Shoehorn Laws Federal Statutes Used to Prosecute ComputerRelated Crime
191
State Computer Crime Statutes
207
Discovery and Computer Evidence
213
Technical Standards for Computing and Communications Protection
221
Glossary
227

Disaster Planning for Information Systems Legal and Regulatory Aspects
107
Electronic Commerce
113
EMail Policy Guide
125

Common terms and phrases

References to this book

Bibliographic information