|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
JSTOR_ocn609854829 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr n||---||||| |
008 |
100427s2008 xx ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d STF
|d IDEBK
|d UMI
|d CEF
|d OCLCQ
|d TOL
|d E7B
|d N$T
|d B24X7
|d DEBSZ
|d ALAUL
|d OCLCQ
|d OCLCO
|d OCLCF
|d JSTOR
|d OCLCQ
|d YDXCP
|d OCLCQ
|d AGLDB
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d IOG
|d VTS
|d AU@
|d COO
|d OCLCQ
|d LVT
|d M8D
|d UKAHL
|d OCLCQ
|d MM9
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 679603873
|a 816373832
|a 1058088273
|
020 |
|
|
|a 9781905356676
|q (electronic bk.)
|
020 |
|
|
|a 1905356676
|q (electronic bk.)
|
020 |
|
|
|z 9781905356669
|q (pbk.)
|
020 |
|
|
|z 1905356668
|q (pbk.)
|
020 |
|
|
|z 1282529013
|
020 |
|
|
|z 9781282529014
|
029 |
1 |
|
|a AU@
|b 000051373128
|
029 |
1 |
|
|a AU@
|b 000067103017
|
029 |
1 |
|
|a DEBBG
|b BV043067183
|
029 |
1 |
|
|a DEBSZ
|b 355450755
|
029 |
1 |
|
|a DEBSZ
|b 396333648
|
029 |
1 |
|
|a DEBSZ
|b 421529512
|
029 |
1 |
|
|a HEBIS
|b 291520634
|
035 |
|
|
|a (OCoLC)609854829
|z (OCoLC)679603873
|z (OCoLC)816373832
|z (OCoLC)1058088273
|
037 |
|
|
|a CL0500000077
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5dqb
|b JSTOR
|
050 |
|
4 |
|a K1327
|b .S64 2008eb
|
072 |
|
7 |
|a LAW
|x 104000
|2 bisacsh
|
072 |
|
7 |
|a URD, LNQD
|2 bicssc
|
072 |
|
7 |
|a LAW104000
|2 bisacsh
|
072 |
|
7 |
|a LAW044000
|2 bisacsh
|
072 |
|
7 |
|a BUS010000
|2 bisacsh
|
082 |
0 |
4 |
|a 343.0999
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Smedinghoff, Thomas J.,
|d 1951-
|
245 |
1 |
0 |
|a Information security law :
|b the emerging standard for corporate compliance /
|c Thomas J. Smedinghoff.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2008.
|
300 |
|
|
|a 1 online resource (182 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Introduction; chapter 1: security basics: the legal perspective; chapter 2: legal response to security; chapter 3: the general duty to provide security; chapter 4: the legal standard for compliance; chapter 5: developing a compliant security program; chapter 6: security controls to consider; chapter 7: the role of standards; chapter 8: security breach notification; appendix.
|
520 |
|
|
|a In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data. Information security law: The emerging standard for corporate compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them. -- Publisher description.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Corporation law.
|
650 |
|
0 |
|a Computer security
|x Law and legislation.
|
650 |
|
0 |
|a Data protection
|x Law and legislation.
|
650 |
|
7 |
|a LAW
|x Computer & Internet.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|x Law and legislation
|2 fast
|
650 |
|
7 |
|a Corporation law
|2 fast
|
650 |
|
7 |
|a Data protection
|x Law and legislation
|2 fast
|
776 |
0 |
8 |
|i Print version:
|z 9781905356669
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh7kw
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26066348
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00034422
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391095
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3235712
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL480413
|
994 |
|
|
|a 92
|b IZTAP
|