Cantitate/Preț
Produs

Privacy in Practice: Establish and Operationalize a Holistic Data Privacy Program: Security, Audit and Leadership Series

Autor Alan Tang
en Limba Engleză Paperback – mar 2023
Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. The employment of new technologies over the last three decades drives personal data to play an increasingly important role in our economies, societies, and everyday lives. Personal information has become an increasingly valuable commodity in the digital age.
At the same time, the abundance and persistence of personal data have elevated the risks to individuals’ privacy. In the age of Big Data, the Internet of Things, Biometrics, and Artificial Intelligence, it is becoming increasingly difficult for individuals to fully comprehend, let alone control, how and for what purposes organizations collect, use, and disclose their personal information. Consumers are growing increasingly concerned about their privacy, making the need for strong privacy champions ever more acute.
With a veritable explosion of data breaches highlighted almost daily across the globe, and the introduction of heavy-handed privacy laws and regulatory frameworks, privacy has taken center stage for businesses. Businesses today are faced with increasing demands for privacy protections, ever-more complex regulations, and ongoing cybersecurity challenges that place heavy demands on scarce resources. Senior management and executives now acknowledge privacy as some of the biggest risks to the business.
Privacy, traditionally, has existed in a separate realm, resulting in an unintentional and problematic barrier drawn between the privacy team and the rest of the organization. With many regulatory frameworks to consider, building an all-encompassing data privacy program becomes increasingly challenging. Effective privacy protection is essential to maintaining consumer trust and enabling a robust and innovative digital economy in which individuals feel they may participate with confidence.
This book aims at helping organizations in establishing a unified, integrated, enterprise-wide privacy program. This book is aiming to help privacy leaders and professionals to bridge the privacy program and business strategies, transform legal terms and dead text to live and easy-to-understand essential requirements which organizations can easily implement, identify and prioritize privacy program gap initiatives and promote awareness and embed privacy into the everyday work of the agency and its staff.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (1) 28974 lei  22-36 zile +3273 lei  5-11 zile
  CRC Press – mar 2023 28974 lei  22-36 zile +3273 lei  5-11 zile
Hardback (1) 76554 lei  43-57 zile
  CRC Press – mar 2023 76554 lei  43-57 zile

Din seria Security, Audit and Leadership Series

Preț: 28974 lei

Preț vechi: 36218 lei
-20% Nou

Puncte Express: 435

Preț estimativ în valută:
5545 5760$ 4606£

Carte disponibilă

Livrare economică 13-27 ianuarie 25
Livrare express 27 decembrie 24 - 02 ianuarie 25 pentru 4272 lei

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781032125473
ISBN-10: 1032125470
Pagini: 471
Ilustrații: 126 Tables, black and white; 45 Line drawings, black and white; 45 Illustrations, black and white
Dimensiuni: 178 x 254 x 28 mm
Greutate: 0.87 kg
Ediția:1
Editura: CRC Press
Colecția CRC Press
Seria Security, Audit and Leadership Series

Locul publicării:Boca Raton, United States

Public țintă

Postgraduate

Notă biografică

Mr. Alan Tang has extensive experience devoted to privacy and security practices. Dr. Tang specializes in establishing and operationalizing risk-based and actionable privacy frameworks and programs in alignment with global privacy laws, regulations, and standards such as GDPR, CCPA/CPRA, PIPEDA, PIPL, LGPD, GAPP, ISO 27701, and NIST PF, etc. He believes in simplifying, automating, and scaling privacy controls to enable business growth.
Dr. Tang has firsthand experience in implementing an enterprise-wide, unified privacy framework and program for a Fortune 50 international company. The privacy framework has been implemented in 50+ countries through three phases. He has a strong history of working with business leaders in a wide range of privacy-related domains such as privacy strategy and roadmap, PIA and DPIA, privacy policies and procedures, privacy-by-design in SDLC, data subject rights assurance, data retention, data disclosure and sharing, data cross-border transfer, data security protection, privacy awareness training, data breach handling, etc.
Dr. Tang holds a Ph.D. degree in Information Security and an MBA degree. Alan also holds numerous privacy and security designations including FIP, CIPP/E, CIPP/US/C, CIPM, CIPT, CISSP, CISA, PMP, and previously ISO27001LA and PCI DSS QSA.

Cuprins

Part 1: Privacy Basics and Landscape, 1. Privacy Concept and a Brief History, 2. Legal Systems, World Models, and Landscape, 3. GDPR, CCPA/CPRA, PIPL and PIPEDA, 4. Privacy Best Practices, Standards, and Certifications, Part 2: Business Impact and a Holistic Framework, 5. Data Protection Drivers and Challenges, 6. Unified Data Protection Framework, 7. Privacy Program Assessment and Roadmap, 8. Privacy Program Management Metrics and Tools, Part 3: Privacy Governance, 9. Data Protection Legal Mandate and Business Requirements, 10. Governance Structure and Responsibilities, 11. Privacy Policies and Procedures, 12. Privacy Awareness, Training, and Engagement, Part 4: Privacy Operations, 13. Privacy Impact Assessment (PIA), 14. Record of Processing Activities, 15. Privacy Notice, 16. Lawful Basis, 17. Data Collection, 18. Data Usage and Maintenance, 19. Personal Data Sharing, 20. Data Residency and Cross-Border Transfers, 21. Data Retention and De-Identification, 22. Security of Personal Data Processing, Part 5: High-Risk Business Scenarios, 23. PbD in Marketing Practices, 24. Workforce Data Protection, 25. Protection of Children’s Data, 26. PbD for AI Solutions, Part 6: Data Breach Handling and DPA Cooperation, 27. Data Subject Rights, Inquiries, and Complaints, 28. Data Breach Handling, 29. DPA Cooperation

Recenzii

“This book serves as a valuable resource for anyone seeking to understand and navigate the complexities of data privacy. Its comprehensive approach and clear explanations make it an essential guide for organizations of all sizes working to establish and maintain robust data protection practices.”
- Dr Mike Brass (CISSP, CIPPE/E, CISM, CRISC)
 
See Mike’s full review at: https://www.linkedin.com/pulse/review-privacy-practice-dr-mike-brass-cissp-cippe-e-cism-crisc--qfqie/?trackingId=CJypYojXzvq1GpauDJH13A%3D%3D
Privacy is a slippery term that people drag out for various reasons, some of which can be misleading. For instance, most American citizens believe that the Fourth Amendment guarantees their right to privacy and will cite it as such. Newsflash, it doesn’t. The Fourth Amendment protects citizens from unreasonable search and seizure by the United States government. It does not guarantee that – for instance – your personal data won’t be harvested and used for all sorts of nefarious purposes by shadowy entities in the data mining industry. Thus, for the sake of self-protection, if for no other reason, everybody in the digital age needs to know what privacy is, its implications, and its applications.
 
The problem arises from the fact that most of the concepts about privacy are rooted in the universe that existed prior to the commercial Internet. That world doesn’t exist anymore, and it hasn’t for some time. The other problem is simple ignorance. We don’t understand the many vital nuances of privacy or what it means to us in terms of personal impacts. But, fear not… Alan Tang has covered the waterfront in “Privacy in Practice.” This comprehensive guide doesn’t simply discuss the general concept of privacy. It defines it from every possible cultural perspective and then proceeds to summarize its various incarnations in worldwide regulations and standards, leaving no stone unturned.
 
Then Tang gets serious about operationalizing the term. In effect, privacy has always been one of those lightweight concepts that everybody agrees is a good idea, but nobody has the slightest notion about how to substantively implement. The book provides a complete and highly credible, holistic architecture of standard real-world controls that can be handily tailored into a governance framework suitable to any general organizational application. The beauty of this book is that it provides nine chapters of explicit operational implementation advice, which ought to be sufficient to assure privacy in any organization of any size. Then, if you still aren’t getting the picture, he provides case examples to illustrate how this can be done in various settings, as well as the practical operational steps to ensure it. So, when you finish this book, you will be as knowledgeable about privacy as any of the world’s leading experts, which Tang just happens to be. Is that a coincidence? I think not.
 
- Dan Shoemaker, PhD - Distinguished Visitor of the Institute of Electrical and Electronics Engineers (IEEE) & Member of the Editorial Board, Computers and Security

Descriere

Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. This book aims at helping privacy leaders, professionals and organizations in establishing a unified, integrated, privacy program, both on a personal and enterprise-wide level.