Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed…mehr
Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topicsPresents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implicationsOffers strategies to integrate privacy principles into business processes and IT systemsCovers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actionsIncludes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.
Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights. Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn.
Inhaltsangabe
Table of contents Preface Chapter 1 - Introduction to Privacy Definition and Importance of Privacy Historical Perspective on Privacy Modern Privacy Challenges Recommendations Chapter Conclusion Questions Chapter 2 - Understanding Personal Data Definition and Types of Personal Data Sensitive Personal Data Data Combinations and Anonymization Recommendations Chapter Conclusion Questions
Chapter 3 - Data Processing Definition and Types of Processing Legal Bases for Processing Data Processing Principles Recommendations Chapter Conclusion Questions
Chapter 4 - Roles and Relationships Data Controller vs. Data Processor Sub-Processors Data Subjects and Their Rights Recommendations Chapter Conclusion Questions
Chapter 5 - Privacy Impact Assessments (PIA) Purpose and Benefits of PIA Conducting a Privacy Impact Assessment (PIA) Importance of Stakeholder Involvement PIA Templates and Examples Recommendations Chapter Conclusion Questions
Chapter 6 - Roles in Privacy Leadership Chief Privacy Officer (CPO) Chief Information Security Officer (CISO) Data Protection Officer (DPO) Privacy Champions Privacy Engineers Recommendations Chapter Conclusion Questions
Chapter 7 - Data Subject Rights (DSR) Data Subject Rights (DSR) Handling Data Subject Requests DSR Tools and Techniques Recommendations Chapter Conclusion Questions
Chapter 8 - Privacy Frameworks and Standards NIST Privacy Framework: Mapping Organizational Practices to the Framework ISO/IEC 27701 Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD Recommendations Chapter Conclusion Questions
Chapter 9 - Major Privacy Laws and Regulations Major Privacy Laws and Regulations California Consumer Privacy Act (CCPA) Health Insurance Portability and Accountability Act (HIPAA) Comparative Analysis of Global Regulations Recommendations Chapter Conclusion Questions
Chapter 10 - International Privacy Concerns Cross-Border Data Transfers Adequacy Decisions Binding Corporate Rules and Standard Contractual Clauses Recommendations Chapter Conclusion Questions
Chapter 11 - Regulatory Enforcement Role of Data Protection Authorities International Cooperation Between Authorities Guidance on Emerging Issues Enforcement Actions and Penalties High-Profile Cases and Their Implications Appeals and Legal Remedies Case Studies of Regulatory Actions Recommendations Chapter Conclusion Questions
Chapter 12 - Privacy by Design and Default Principles of Privacy by Design Embedding Privacy in Organizational Culture Lifecycle Management of Personal Data User-Centric Privacy Controls Implementing Privacy by Default Case Studies and Best Practices Recommendations Chapter Conclusion Questions
Chapter 13 - Privacy Technology and Tools Privacy Enhancing Technologies (PETs): Anonymization vs. Pseudonymization Data Masking and Encryption Privacy Management Software Recommendations Chapter Conclusion Questions
Chapter 14 - Data Breach Management Identifying and Responding to Data Breaches Notification Requirements Post-Breach Remediation Recommendations Chapter Conclusion Questions
Chapter 15 - Emerging Privacy Trends Artificial Intelligence and Privacy Internet of Things (IoT) and Privacy Blockchain and Privacy Recommendations Chapter Conclusion Questions
Chapter 16 - Privacy Program Implementation Establishing a Privacy Governance Structure Developing Privacy Policies and Procedures Implementing Privacy Controls and Measures Monitoring and Reporting on Privacy Compliance Continuous Improvement of the Privacy Program Recommendations Chapter Conclusion Questions
Chapter 17 - Privacy Training and Awareness Developing Effective Privacy Training Programs Engaging Employees in Privacy Awareness Training Tools and Resources Sample Annual Privacy Training Plan Recommendations Chapter Conclusion Questions
Chapter 18 - Privacy Audits & Assessments Privacy Audits and Assessments Using Assessment Tools Integrating Assessments with Risk Management Reporting and Follow-Up Actions Recommendations Chapter Conclusion Questions
Table of contents Preface Chapter 1 - Introduction to Privacy Definition and Importance of Privacy Historical Perspective on Privacy Modern Privacy Challenges Recommendations Chapter Conclusion Questions Chapter 2 - Understanding Personal Data Definition and Types of Personal Data Sensitive Personal Data Data Combinations and Anonymization Recommendations Chapter Conclusion Questions
Chapter 3 - Data Processing Definition and Types of Processing Legal Bases for Processing Data Processing Principles Recommendations Chapter Conclusion Questions
Chapter 4 - Roles and Relationships Data Controller vs. Data Processor Sub-Processors Data Subjects and Their Rights Recommendations Chapter Conclusion Questions
Chapter 5 - Privacy Impact Assessments (PIA) Purpose and Benefits of PIA Conducting a Privacy Impact Assessment (PIA) Importance of Stakeholder Involvement PIA Templates and Examples Recommendations Chapter Conclusion Questions
Chapter 6 - Roles in Privacy Leadership Chief Privacy Officer (CPO) Chief Information Security Officer (CISO) Data Protection Officer (DPO) Privacy Champions Privacy Engineers Recommendations Chapter Conclusion Questions
Chapter 7 - Data Subject Rights (DSR) Data Subject Rights (DSR) Handling Data Subject Requests DSR Tools and Techniques Recommendations Chapter Conclusion Questions
Chapter 8 - Privacy Frameworks and Standards NIST Privacy Framework: Mapping Organizational Practices to the Framework ISO/IEC 27701 Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD Recommendations Chapter Conclusion Questions
Chapter 9 - Major Privacy Laws and Regulations Major Privacy Laws and Regulations California Consumer Privacy Act (CCPA) Health Insurance Portability and Accountability Act (HIPAA) Comparative Analysis of Global Regulations Recommendations Chapter Conclusion Questions
Chapter 10 - International Privacy Concerns Cross-Border Data Transfers Adequacy Decisions Binding Corporate Rules and Standard Contractual Clauses Recommendations Chapter Conclusion Questions
Chapter 11 - Regulatory Enforcement Role of Data Protection Authorities International Cooperation Between Authorities Guidance on Emerging Issues Enforcement Actions and Penalties High-Profile Cases and Their Implications Appeals and Legal Remedies Case Studies of Regulatory Actions Recommendations Chapter Conclusion Questions
Chapter 12 - Privacy by Design and Default Principles of Privacy by Design Embedding Privacy in Organizational Culture Lifecycle Management of Personal Data User-Centric Privacy Controls Implementing Privacy by Default Case Studies and Best Practices Recommendations Chapter Conclusion Questions
Chapter 13 - Privacy Technology and Tools Privacy Enhancing Technologies (PETs): Anonymization vs. Pseudonymization Data Masking and Encryption Privacy Management Software Recommendations Chapter Conclusion Questions
Chapter 14 - Data Breach Management Identifying and Responding to Data Breaches Notification Requirements Post-Breach Remediation Recommendations Chapter Conclusion Questions
Chapter 15 - Emerging Privacy Trends Artificial Intelligence and Privacy Internet of Things (IoT) and Privacy Blockchain and Privacy Recommendations Chapter Conclusion Questions
Chapter 16 - Privacy Program Implementation Establishing a Privacy Governance Structure Developing Privacy Policies and Procedures Implementing Privacy Controls and Measures Monitoring and Reporting on Privacy Compliance Continuous Improvement of the Privacy Program Recommendations Chapter Conclusion Questions
Chapter 17 - Privacy Training and Awareness Developing Effective Privacy Training Programs Engaging Employees in Privacy Awareness Training Tools and Resources Sample Annual Privacy Training Plan Recommendations Chapter Conclusion Questions
Chapter 18 - Privacy Audits & Assessments Privacy Audits and Assessments Using Assessment Tools Integrating Assessments with Risk Management Reporting and Follow-Up Actions Recommendations Chapter Conclusion Questions
Answers Index
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826