Cargando…

Information security law : the emerging standard for corporate compliance /

In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information tech...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Smedinghoff, Thomas J., 1951-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely : IT Governance Pub., 2008.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 JSTOR_ocn609854829
003 OCoLC
005 20231005004200.0
006 m o d
007 cr n||---|||||
008 100427s2008 xx ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d STF  |d IDEBK  |d UMI  |d CEF  |d OCLCQ  |d TOL  |d E7B  |d N$T  |d B24X7  |d DEBSZ  |d ALAUL  |d OCLCQ  |d OCLCO  |d OCLCF  |d JSTOR  |d OCLCQ  |d YDXCP  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d MERUC  |d OCLCQ  |d IOG  |d VTS  |d AU@  |d COO  |d OCLCQ  |d LVT  |d M8D  |d UKAHL  |d OCLCQ  |d MM9  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 679603873  |a 816373832  |a 1058088273 
020 |a 9781905356676  |q (electronic bk.) 
020 |a 1905356676  |q (electronic bk.) 
020 |z 9781905356669  |q (pbk.) 
020 |z 1905356668  |q (pbk.) 
020 |z 1282529013 
020 |z 9781282529014 
029 1 |a AU@  |b 000051373128 
029 1 |a AU@  |b 000067103017 
029 1 |a DEBBG  |b BV043067183 
029 1 |a DEBSZ  |b 355450755 
029 1 |a DEBSZ  |b 396333648 
029 1 |a DEBSZ  |b 421529512 
029 1 |a HEBIS  |b 291520634 
035 |a (OCoLC)609854829  |z (OCoLC)679603873  |z (OCoLC)816373832  |z (OCoLC)1058088273 
037 |a CL0500000077  |b Safari Books Online 
037 |a 22573/ctt4k5dqb  |b JSTOR 
050 4 |a K1327  |b .S64 2008eb 
072 7 |a LAW  |x 104000  |2 bisacsh 
072 7 |a URD, LNQD  |2 bicssc 
072 7 |a LAW104000  |2 bisacsh 
072 7 |a LAW044000  |2 bisacsh 
072 7 |a BUS010000  |2 bisacsh 
082 0 4 |a 343.0999 
049 |a UAMI 
100 1 |a Smedinghoff, Thomas J.,  |d 1951- 
245 1 0 |a Information security law :  |b the emerging standard for corporate compliance /  |c Thomas J. Smedinghoff. 
260 |a Ely :  |b IT Governance Pub.,  |c 2008. 
300 |a 1 online resource (182 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
505 0 |a Introduction; chapter 1: security basics: the legal perspective; chapter 2: legal response to security; chapter 3: the general duty to provide security; chapter 4: the legal standard for compliance; chapter 5: developing a compliant security program; chapter 6: security controls to consider; chapter 7: the role of standards; chapter 8: security breach notification; appendix. 
520 |a In today's business environment, virtually all of a company's daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure. While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data. Information security law: The emerging standard for corporate compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide. This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them. -- Publisher description. 
588 0 |a Print version record. 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Corporation law. 
650 0 |a Computer security  |x Law and legislation. 
650 0 |a Data protection  |x Law and legislation. 
650 7 |a LAW  |x Computer & Internet.  |2 bisacsh 
650 7 |a Computer security  |x Law and legislation  |2 fast 
650 7 |a Corporation law  |2 fast 
650 7 |a Data protection  |x Law and legislation  |2 fast 
776 0 8 |i Print version:  |z 9781905356669 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh7kw  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26066348 
938 |a Books 24x7  |b B247  |n bks00034422 
938 |a EBSCOhost  |b EBSC  |n 391095 
938 |a YBP Library Services  |b YANK  |n 3235712 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL480413 
994 |a 92  |b IZTAP