skip to content
Data protection : governance, risk management, and compliance Preview this item
ClosePreview this item

Data protection : governance, risk management, and compliance

Author: David G Hill
Publisher: Boca Raton, FL : Taylor & Francis, ©2010.
Edition/Format:   eBook : Document : EnglishView all editions and formats

Explains how to gain a handle on the vital aspects of data protection, offering an understanding of how data protection fits into various organizations. This book shows how to improve the data  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Genre/Form: Electronic books
Additional Physical Format: Print version:
Hill, David G. (David Gary), 1943-
Data protection.
Boca Raton, FL : Taylor & Francis, ©2009
(DLC) 2009024410
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: David G Hill
ISBN: 9781439806937 1439806934
OCLC Number: 464265893
Description: 1 online resource (xxv, 304 pages) : illustrations
Contents: The Time Has Come for ChangeWhat to Look for in This Chapter Why Data Protection Is Important What Data Protection Is Data Protection Has to Be Placed in the Right Framework Evolving to the Governance, Risk Management, and Compliance Framework Ride the Sea Change in Data Protection How to Read This Book An Aside on Process Management Key TakeawaysBusiness Continuity: The First Foundation for Data ProtectionWhat to Look for in This Chapter Business Continuity as a Key to Risk Management Business Continuity and Data Protection Business Continuity Is Not Just Disaster Recovery Disaster Recovery: Let's Get Physical Operational Recovery: Think LogicallyDisaster Recovery Requires Judgment; OperationalRecovery Requires Automation Logical Data Protection Gets Short Shift in Business ContinuityDo Not Neglect Any Facet of Data Protection Key TakeawaysData Protection-Where the Problems LieWhat to Look for in This Chapter Data Protection as It Was in the Beginning Typical Data Protection Technology Today Still Leaves a Lot to Be DesiredSumming up Data Protection Challenges by Category Key TakeawaysData Protection-Setting the Right ObjectivesWhat to Look for in This Chapter How High Is High Enough for Data Availability? SNIA's Data Value Classification: A Point of Departure Do Not Equate Availability with Value Availability Objectives for Operational Recovery and Disaster Recovery Are Not Necessarily the SameAvailability Is Not the Only Data Protection Objective All Primary Data Protection Objectives Have to Be Met Key TakeawaysData Protection-Getting the Right DegreeWhat to Look for in This Chapter General Use Classes of Data The Third Degree-Levels of Exposure Key TakeawaysInformation Lifecycle Management Changes the Data Protection Technology MixWhat to Look for in This Chapter Why Data Lifecycle Management Is Not Enough-The Need for Metadata and Management ILM Is Deep into Logical Pools of Storage Archiving through a New Lens Active Archiving and Deep Archiving ILM Changes the Data Protection Technology Mix Key TakeawaysCompliance: A Key Piece of the GRC PuzzleWhat to Look for in This ChapterWhat Compliance Is All AboutThe Relationship between Compliance and Risk Management Compliance and Data ProtectionThe Role of People in Compliance The Role of Process in Compliance The Role of Technology in Compliance Key TakeawaysGovernance: The Last Piece in the GRC PuzzleWhat to Look for in This Chapter Data Governance Must Respond to Changes in the Federal Rules of Civil ProcedureThe Impact on Global Civil Litigation The Big Three-Governance, Risk Management, and Compliance-and Data Protection Objectives Key TakeawaysThe Critical Role of Data Retention What to Look for in This Chapter The Need for Data Retention Management Where the Responsibility for Data Retention Policy Management LiesMaking the Case for Archiving for Data Retention Compliance and Governance Creating Data Archive Storage Pools by Data Retention Attributes Key TakeawaysData Security-An Ongoing ChallengeWhat to Look for in This Chapter How Data Protection and Data Security Are Interrelated Information Security versus Data Security Information Assurance Information Risk Management Data Preservation Is Data That Is Good to the Last BitConfidentiality as a Private and Public Concern The Role of Data Availability in Data Security Three Strategies for Protecting Confidentiality of Information Confidentiality through Limiting Access to Data Confidentiality through Limiting Use of Information Confidentiality by Rendering Information Unusable to Unauthorized UsersThe Special Case of Storage Security Key TakeawaysWhere Data Protection Technologies Fit in the New ModelWhat to Look for in This Chapter Categorizing Data Protection Products Mapping the Base Data Protection Technologies to the ILM Version of the Data Protection Framework Key TakeawaysBack to Basics-Extending the Current ModelWhat to Look for in This Chapter The Move to Multiple-Parity RAID Evolving Backup/Restore Software Recovery ManagementMoving Data Manually and Electronically-The Place of Vaulting and Consolidation Remote Office Data Protection At Your Service-The Role of Service Suppliers Key TakeawaysWhen Supporting Actors Play Lead RolesWhat to Look for in This Chapter Data Deduplication and Other Space-Saving Technologies WAN Acceleration Data Protection Management Data Protection Change Management Disaster Recovery Testing Data ClassificationKey TakeawaysDisk and Tape-Complementing and Competing with One AnotherWhat to Look for in This Chapter Disk-Based Backup Speeding up the Backup/Restore Process-Your Mileage May Vary Improving Restore Reliability Keep in Mind Virtual Tape Virtual Tape Library MAID Removable Disk Drives and Disk Media Data Protection Appliances Tape Automation Key TakeawaysTechnologies for High Availability and Low (or No) Data LossWhat to Look for in This Chapter Copy Strategies Replication Strategies Key TakeawaysSpecial Requirements for Compliance, Governance, and Data SecurityWhat to Look for in This Chapter The Use of WORM Technology WORM Tape WORM DiskElectronic Locking Guaranteeing the Authenticity of Data Encryption TechniquesCompliance/Governance Appliance Data Shredding Key TakeawayseDiscovery and the Electronic Discovery Reference Model What to Look for in This Chapter Information Management-Getting eDiscovery off on the Right FootOverview of the Steps of the EDRM ModelKey TakeawaysCloud Computing, SaaS, and Other Data Protection Services What to Look for in This ChapterGrowth in Services Raises Questions for Data ProtectionAn Introduction to Cloud ComputingWhere IT Services Are HeadedData Protection Considerations in Using a Services ModelConfronting the Issue of Control and Third-Party Services Key TakeawaysOther Considerations in Data Protection What to Look for in This Chapter From Flash Computing to Tape-The Role of Tiering in Data ProtectionThe Impact of Server and Storage Virtualization on Data ProtectionMaster Data Management and Data ProtectionGreen Computing and Data Protection Key TakeawaysTying It All Together, Including the PRO-Tech Data Protection ModelWhat to Look for in This Chapter The PRO-Tech Model for Data Protection The PRO-Tech Model-Level 1Tying the PRO-Tech Layers to GRC Business Responsibilities Data Protection Is Everyone's Business-Last Call for Data GovernanceSynthesizing a Data Protection Framework Guidelines for Data Protection The Challenge Ahead and a Call to Action Key TakeawaysGlossaryIndex
Responsibility: David G. Hill.


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Data protection : governance, risk management, and compliance
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "464265893" ;
    library:placeOfPublication <> ;
    library:placeOfPublication <> ; # Boca Raton, FL
    schema:about <> ;
    schema:about <> ; # Computer security
    schema:about <> ; # COMPUTERS--System Administration--Disaster & Recovery
    schema:about <> ; # Data protection
    schema:about <> ; # Information technology--Security measures
    schema:about <> ; # Information technology--Security measures
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2010" ;
    schema:creator <> ; # David Gary Hill
    schema:datePublished "2010" ;
    schema:exampleOfWork <> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <> ;
    schema:name "Data protection : governance, risk management, and compliance"@en ;
    schema:productID "464265893" ;
    schema:publication <> ;
    schema:publisher <> ; # Taylor & Francis
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:url <> ;
    schema:workExample <> ;
    wdrs:describedby <> ;

Related Entities

<> # Taylor & Francis
    a bgn:Agent ;
    schema:name "Taylor & Francis" ;

<> # Boca Raton, FL
    a schema:Place ;
    schema:name "Boca Raton, FL" ;

<> # COMPUTERS--System Administration--Disaster & Recovery
    a schema:Intangible ;
    schema:name "COMPUTERS--System Administration--Disaster & Recovery"@en ;

<> # Information technology--Security measures
    a schema:Intangible ;
    schema:name "Information technology--Security measures"@en ;

<> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;

<> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;

<> # Information technology--Security measures
    a schema:Intangible ;
    schema:name "Information technology--Security measures"@en ;

<> # David Gary Hill
    a schema:Person ;
    schema:birthDate "1943" ;
    schema:familyName "Hill" ;
    schema:givenName "David Gary" ;
    schema:givenName "David G." ;
    schema:name "David Gary Hill" ;

    a schema:ProductModel ;
    schema:isbn "1439806934" ;
    schema:isbn "9781439806937" ;

    a schema:CreativeWork ;
    rdfs:label "Data protection." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <> ; # Data protection : governance, risk management, and compliance

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.