skip to content
Legal issues in information security, second edition Preview this item
ClosePreview this item
Checking...

Legal issues in information security, second edition

Author: Joanna Lyn Grama
Publisher: Burlington, MA : Jones & Bartlett Learning, ©2015.
Series: Jones & Bartlett Learning information systems security & assurance series.
Edition/Format:   eBook : Document : English : 2nd edView all editions and formats
Summary:
This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Grama, Joanna Lyn.
Legal issues in information security.
Burlington, MA : Jones & Bartlett Learning, [2015]
(DLC) 2014430726
(OCoLC)894671110
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Joanna Lyn Grama
ISBN: 9781284054743 1284054748 9781284054750 1284054756
OCLC Number: 894631931
Notes: Title from title screen.
Description: 1 online resource.
Contents: Cover; Title Page; Copyright; Contents; Dedication; Preface; Acknowledgments; About the Author; Part One: Fundamental Concepts; Chapter 1 Information Security Overview; Why Is Information Security an Issue?; What Is Information Security?; What Is Confidentiality?; What Is Integrity?; What Is Availability?; Basic Information Security Concepts; Vulnerabilities; Threats; Risks; Safeguards; Choosing Safeguards; What Are Common Information Security Concerns?; Shoulder Surfing; Social Engineering; Phishing and Targeted Phishing Scams; Malware; Spyware and Keystroke Loggers; Logic Bombs; Backdoors Denial of Service AttacksDo Different Types of Information Require Different Types of Protection?; What Are the Mechanisms that Ensure Information Security?; Laws and Legal Duties; Contracts; Organizational Governance; Voluntary Organizations; Do Special Kinds of Data Require Special Kinds of Protection?; Chapter Summary; Key Concepts and Terms; Chapter 1 Assessment; Chapter 2 Privacy Overview; Why Is Privacy an Issue?; What Is Privacy?; How Is Privacy Different from Information Security?; What Are the Sources of Privacy Law?; Constitutional Law; Federal Laws; State Laws; Common Laws Voluntary AgreementsWhat Are Threats to Personal Data Privacy in the Information Age?; Technology-Based Privacy Concerns; People-Based Privacy Concerns; What Is Workplace Privacy?; Telephone and Voice Mail Monitoring; Video Surveillance Monitoring; Computer Use Monitoring; E-mail Monitoring; What Are General Principles for Privacy Protection in Information Systems?; Privacy Policies and Data Privacy Laws; Chapter Summary; Key Concepts and Terms; Chapter 2 Assessment; Endnotes; Chapter 3 The American Legal System; The American Legal System; Federal Government; State Government Consumer Financial InformationWho Regulates Financial Institutions?; The Federal Reserve System; Federal Deposit Insurance Corporation; National Credit Union Administration; Office of the Comptroller of the Currency; Special Roles of the Consumer Financial Protection Bureau and the Federal Trade Commission; The Federal Financial Institutions Examination Council (FFIEC); The Gramm-Leach-Bliley Act; Purpose, Scope, and Main Requirements; The Privacy Rule; The Safeguards Rule; The Pretexting Rule; Oversight; Federal Trade Commission Red Flags Rule; Purpose; Scope; Main Requirements; Oversight
Series Title: Jones & Bartlett Learning information systems security & assurance series.
Responsibility: Joanna Lyn Grama.

Abstract:

This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. --

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/894631931> # Legal issues in information security, second edition
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "894631931" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/549304458#Place/burlington_ma> ; # Burlington, MA
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'https://ezproxy.saskpolytech.ca/login?url=http://library.books24x7.com/library.asp?^B&bookid=69821'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/information_storage_and_retrieval_systems_law_and_legislation> ; # Information storage and retrieval systems--Law and legislation
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/information_storage_and_retrieval_systems_security_measures_law_and_legislation_united_states> ; # Information storage and retrieval systems--Security measures--Law and legislation--United States
    schema:about <http://dewey.info/class/342.730858/e21/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/law_public> ; # LAW / Public
    schema:about <http://id.loc.gov/authorities/classification/KF807> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/information_storage_and_retrieval_systems_law_and_legislation_united_states> ; # Information storage and retrieval systems--Law and legislation--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Place/united_states> ; # United States.
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/law_constitutional> ; # LAW / Constitutional
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/data_protection_law_and_legislation_united_states> ; # Data protection--Law and legislation--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/549304458#Topic/data_protection_law_and_legislation> ; # Data protection--Law and legislation
    schema:bookEdition "2nd ed." ;
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2015" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/549304458#Person/grama_joanna_lyn> ; # Joanna Lyn Grama
    schema:datePublished "2015" ;
    schema:description "This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. --"@en ;
    schema:description "Cover; Title Page; Copyright; Contents; Dedication; Preface; Acknowledgments; About the Author; Part One: Fundamental Concepts; Chapter 1 Information Security Overview; Why Is Information Security an Issue?; What Is Information Security?; What Is Confidentiality?; What Is Integrity?; What Is Availability?; Basic Information Security Concepts; Vulnerabilities; Threats; Risks; Safeguards; Choosing Safeguards; What Are Common Information Security Concerns?; Shoulder Surfing; Social Engineering; Phishing and Targeted Phishing Scams; Malware; Spyware and Keystroke Loggers; Logic Bombs; Backdoors"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/549304458> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/549304458#Series/jones_&_bartlett_learning_information_systems_security_&_assurance_series> ; # Jones & Bartlett Learning information systems security & assurance series.
    schema:isSimilarTo <http://www.worldcat.org/oclc/894671110> ;
    schema:name "Legal issues in information security, second edition"@en ;
    schema:productID "894631931" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/894631931#PublicationEvent/burlington_ma_jones_&_bartlett_learning_2015> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/549304458#Agent/jones_&_bartlett_learning> ; # Jones & Bartlett Learning
    schema:url <http://0-www.books24x7.com.www.livermore.lib.ca.us/marc.asp?bookid=69821> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=4441312> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=778395> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=69821> ;
    schema:url "https://ezproxy.saskpolytech.ca/login?url=http://library.books24x7.com/library.asp?^B&bookid=69821" ;
    schema:workExample <http://worldcat.org/isbn/9781284054750> ;
    schema:workExample <http://worldcat.org/isbn/9781284054743> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/894631931> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/549304458#Agent/jones_&_bartlett_learning> # Jones & Bartlett Learning
    a bgn:Agent ;
    schema:name "Jones & Bartlett Learning" ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Person/grama_joanna_lyn> # Joanna Lyn Grama
    a schema:Person ;
    schema:familyName "Grama" ;
    schema:givenName "Joanna Lyn" ;
    schema:name "Joanna Lyn Grama" ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Place/burlington_ma> # Burlington, MA
    a schema:Place ;
    schema:name "Burlington, MA" ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Place/united_states> # United States.
    a schema:Place ;
    schema:name "United States." ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Series/jones_&_bartlett_learning_information_systems_security_&_assurance_series> # Jones & Bartlett Learning information systems security & assurance series.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/894631931> ; # Legal issues in information security, second edition
    schema:name "Jones & Bartlett Learning information systems security & assurance series." ;
    schema:name "Jones & Bartlett Learning information systems security & assurance series" ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Topic/data_protection_law_and_legislation> # Data protection--Law and legislation
    a schema:Intangible ;
    schema:name "Data protection--Law and legislation"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Topic/data_protection_law_and_legislation_united_states> # Data protection--Law and legislation--United States
    a schema:Intangible ;
    schema:name "Data protection--Law and legislation--United States"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Topic/information_storage_and_retrieval_systems_law_and_legislation> # Information storage and retrieval systems--Law and legislation
    a schema:Intangible ;
    schema:name "Information storage and retrieval systems--Law and legislation"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Topic/information_storage_and_retrieval_systems_law_and_legislation_united_states> # Information storage and retrieval systems--Law and legislation--United States
    a schema:Intangible ;
    schema:name "Information storage and retrieval systems--Law and legislation--United States"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Topic/information_storage_and_retrieval_systems_security_measures_law_and_legislation_united_states> # Information storage and retrieval systems--Security measures--Law and legislation--United States
    a schema:Intangible ;
    schema:name "Information storage and retrieval systems--Security measures--Law and legislation--United States"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/549304458#Topic/law_constitutional> # LAW / Constitutional
    a schema:Intangible ;
    schema:name "LAW / Constitutional"@en ;
    .

<http://worldcat.org/isbn/9781284054743>
    a schema:ProductModel ;
    schema:isbn "1284054748" ;
    schema:isbn "9781284054743" ;
    .

<http://worldcat.org/isbn/9781284054750>
    a schema:ProductModel ;
    schema:isbn "1284054756" ;
    schema:isbn "9781284054750" ;
    .

<http://www.worldcat.org/oclc/894671110>
    a schema:CreativeWork ;
    rdfs:label "Legal issues in information security." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/894631931> ; # Legal issues in information security, second edition
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.