0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (812)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback): Peter Gregory CIPM Certified Information Privacy Manager All-in-One Exam Guide (Paperback)
Peter Gregory
R996 Discovery Miles 9 960 Ships in 10 - 15 working days

This self-study guide covers every topic on the Certified Information Privacy Manager exam Take IAPP's rigorous Certified Information Privacy Manager (CIPM) exam with complete confidence using the comprehensive information contained in this highly effective study guide. The book enhances candidates' abilities to design, build, and run information privacy management programs. Written by a security and privacy expert and experienced author, CIPM Certified Information Privacy Manager All-in-One Exam Guide is based on proven pedagogy and thoroughly prepares candidates to pass this exam. Beyond exam preparation, the guide also serves as a valuable on-the-job reference. *Provides 100% coverage of all eight objectives for the CIPM exam *Online content includes 300 practice questions in the Total Tester exam engine *Written by a security and privacy expert, educator, and experienced author

Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R908 R787 Discovery Miles 7 870 Save R121 (13%) Ships in 18 - 22 working days
The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover): Malcolm Warner, Mike Stone The Data Bank Society (Routledge Revivals) - Organizations, Computers and Social Freedom (Hardcover)
Malcolm Warner, Mike Stone
R3,288 R1,367 Discovery Miles 13 670 Save R1,921 (58%) Ships in 10 - 15 working days

This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing. Discussing areas such as the impact of the computer on administration, privacy and the storage on information, the authors assess the technical and social feasibility of constructing integrated data banks to cover the details of populations. The book was hugely influential both in terms of scholarship and legislation, and the years following saw the introduction of the Data Protection Act of 1984, which was then consolidated by the Act of 1998. The topics under discussion remain of great concern to the public in our increasingly web-based world, ensuring the continued relevance of this title to academics and students with an interest in data protection and public privacy.

Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition): C Hadnagy Social Engineering - The Science of Human Hacking 2e (Paperback, 2nd Edition)
C Hadnagy
R862 R659 Discovery Miles 6 590 Save R203 (24%) Ships in 10 - 15 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R9,442 Discovery Miles 94 420 Ships in 18 - 22 working days
Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004): Neal Koblitz Algebraic Aspects of Cryptography (Hardcover, 1st ed. 1998. Corr. 3rd printing 2004)
Neal Koblitz; Appendix by A.J. Menezes, Y.-H. Wu, R.J. Zuccherato
R4,804 Discovery Miles 48 040 Ships in 18 - 22 working days

This is a textbook for a course (or self-instruction) in cryptography with emphasis on algebraic methods. The first half of the book is a self-contained informal introduction to areas of algebra, number theory, and computer science that are used in cryptography. Most of the material in the second half - "hidden monomial" systems, combinatorial-algebraic systems, and hyperelliptic systems - has not previously appeared in monograph form. The Appendix by Menezes, Wu, and Zuccherato gives an elementary treatment of hyperelliptic curves. This book is intended for graduate students, advanced undergraduates, and scientists working in various fields of data security.

Throughput Accounting in a Hyperconnected World (Hardcover): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Hardcover)
Ionica Oncioiu
R4,855 Discovery Miles 48 550 Ships in 18 - 22 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover): Sunita Vikrant Dhavale Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover)
Sunita Vikrant Dhavale
R4,374 Discovery Miles 43 740 Ships in 18 - 22 working days
The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age... The Online World, What You Think You Know and What You Don't - 4 Critical Tools for Raising Kids in the Digital Age (Hardcover)
Rania Mankarious; Foreword by Laura Berman
R727 Discovery Miles 7 270 Ships in 9 - 17 working days
Electronic Warfare in the Information Age (Hardcover): D.C. Schleher Electronic Warfare in the Information Age (Hardcover)
D.C. Schleher
R4,097 Discovery Miles 40 970 Ships in 18 - 22 working days

This is an advanced practitioner's guide to current concepts and threats associated with modern electronic warfare (EW). It identifies and explains the newest radar communications threats, and provides practical, "how-to" information on designing and implementing ECM and ECCM systems. The aim of the text is to help the reader develop ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, and jammer upgrading procedures.

Cybersecurity for Beginners (Hardcover, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Hardcover, 2nd Revised edition)
Raef Meeuwisse
R680 Discovery Miles 6 800 Ships in 10 - 15 working days
The Future of Open Data (Hardcover): Pamela Robinson, Teresa Scassa The Future of Open Data (Hardcover)
Pamela Robinson, Teresa Scassa
R1,234 Discovery Miles 12 340 Ships in 10 - 15 working days

The Future of Open Data flows from a multi-year Social Sciences and Humanities Research Council (SSHRC) Partnership Grant project that set out to explore open government geospatial data from an interdisciplinary perspective. Researchers on the grant adopted a critical social science perspective grounded in the imperative that the research should be relevant to government and civil society partners in the field. This book builds on the knowledge developed during the course of the grant and asks the question, "What is the future of open data?" The contributors' insights into the future of open data combine observations from five years of research about the Canadian open data community with a critical perspective on what could and should happen as open data efforts evolve. Each of the chapters in this book addresses different issues and each is grounded in distinct disciplinary or interdisciplinary perspectives. The opening chapter reflects on the origins of open data in Canada and how it has progressed to the present date, taking into account how the Indigenous data sovereignty movement intersects with open data. A series of chapters address some of the pitfalls and opportunities of open data and consider how the changing data context may impact sources of open data, limits on open data, and even liability for open data. Another group of chapters considers new landscapes for open data, including open data in the global South, the data priorities of local governments, and the emerging context for rural open data.

How to Talk to Your Kids About Pornography (Paperback): Educate and Empower Kids, Dina Alexander How to Talk to Your Kids About Pornography (Paperback)
Educate and Empower Kids, Dina Alexander; Illustrated by Jera Mehrdad
R358 R332 Discovery Miles 3 320 Save R26 (7%) Ships in 18 - 22 working days
Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.): Steve G. Watkins Iso/Iec 27001 - 2022: An introduction to information security and the ISMS standard (Paperback, Revised ed.)
Steve G. Watkins
R444 Discovery Miles 4 440 Ships in 18 - 22 working days

ISO/IEC 27001:2022 - An introduction to information security and the ISMS standardThe perfect introduction to the principles of information security management and ISO 27001:2022An ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security, this pocket guide will ensure the ISMS (information security management system) you put in place is effective, reliable and auditable. Written by an acknowledged expert on the ISO/IEC 27001 standard, ISO/IEC 27001:2022 - An introduction to information security and the ISMS standard is an ideal primer for anyone implementing an ISMS aligned to ISO 27001:2022. This must-have resource gives a clear, concise and easy-to-read introduction to information security, providing guidance to ensure the management systems you put in place are effective, reliable and auditable. This pocket guide will help you to: Make informed decisions - Enables key employees to make better decisions before embarking on an information security project. Ensure everyone is up to speed - Gives the non-specialists on the project board and in the project team a clearer understanding of what an ISMS involves, reflecting ISO 27001:2022. Raise awareness among staff - Ensures that your staff know what is at stake with regard to information security and understand what is expected of them. Enhance your competitiveness - Gives you confidence to begin your ISO 27001:2022 implementation journey and let your customers know that the information you hold about them is managed and protected appropriately. Get up to speed with the ISO 27001:2022 updates and keep your information secure

The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience... The Cyber Security Handbook - Prepare for, respond to and recover from cyber attacks with the IT Governance Cyber Resilience Framework (CRF) (Hardcover)
Alan Calder
R1,621 Discovery Miles 16 210 Ships in 18 - 22 working days

In the world as we know it, you can be attacked both physically and virtually. For today's organisations, which rely so heavily on technology - particularly the Internet - to do business, the latter is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual activities identified in the IT Governance Cyber Resilience Framework (CRF) that can help organisations become cyber resilient and combat the cyber threat landscape. Suitable for senior directors (CEO, CISO, CIO), compliance managers, privacy managers, IT managers, security analysts and others, the book is divided into six parts: Part 1: Introduction. The world of cyber security and the approach taken in this book. Part 2: Threats and vulnerabilities. A discussion of a range of threats organisations face, organised by threat category, to help you understand what you are defending yourself against before you start thinking about your actual defences. Part 3: The CRF processes. Detailed discussions of each of the 24 CRF processes, explaining a wide range of security areas by process category and offering guidance on how to implement each. Part 4: Eight steps to implementing cyber security. Our eight-step approach to implementing the cyber security processes you need and maintaining them. Part 5: Reference frameworks. An explanation of how standards and frameworks work, along with their benefits. It also presents ten framework options, introducing you to some of the best-known standards and giving you an idea of the range available. Part 6: Conclusion and appendices. The appendices include a glossary of all the acronyms and abbreviations used in this book. Whether you are just starting out on the road to cyber security or looking to enhance and improve your existing cyber resilience programme, it should be clear that cyber security is no longer optional in today's information age; it is an essential component of business success. Make sure you understand the threats and vulnerabilities your organisation faces and how the Cyber Resilience Framework can help you tackle them. Start your journey to cyber security now - buy this book today!

Global Challenges for Identity Policies (Hardcover): E. Whitley, G. Hosein Global Challenges for Identity Policies (Hardcover)
E. Whitley, G. Hosein
R1,438 Discovery Miles 14 380 Ships in 18 - 22 working days

The goals of this book are to provide a comprehensive review of identity policies as they are being implemented in various countries around the world, to consider the key arenas where identity policies are developed and to provide intellectual coherence for making sense of these various activities.

Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover): Curtis D. Frye Privacy-Enhanced Business - Adapting to the Online Environment (Hardcover)
Curtis D. Frye
R2,568 Discovery Miles 25 680 Ships in 18 - 22 working days

With more than 200 million people online and their numbers on the rise, growing also is a perceived threat to personal privacy. A trend toward consumer protective legislation is developing in Europe and shows signs of developing in the U.S. Frye examines the new online environment, the national and international legislative scenarios that could affect the way online business is done, and proposes steps that would allow organizations to determine the policies best for themselves within privacy-enhanced environments. He lays out the privacy interests and concerns of Internet users in the context of privacy laws in Europe, Canada, and the U.S. Then, without demonizing or lionizing them, he looks impartially at how corporations could and might have to function under a variety of likely legislations. Frye's book, among the first to attempt the task, is a timely, much needed advisory-and warning-for top echelon executives in the public and private sectors both, particularly in marketing and sales, areas where privacy activists are concentrating their efforts. It is also an important source of information and thought for academics and their graduate-level students.

Frye introduces the Internet as a social and technological phenomenon by recounting briefly the early days of its predecessor, ARPANet. In the next chapters he fills in the policy background from a legal standpoint, explaining the thrust toward privacy that emerged through Supreme Court and lower court decisions. He then examines Internet economics, and from there turns to Internet-based advertising. He also covers the controversy over cookies and shows what Web users can do to visit Web sites without leaving crumbs. He introduces the infomediary, a type of organization that could allow consumers to maintain anonymity while still granting businesses access to detailed demographic and behavioral information. Frye describes a range of scenarios that could be played out over the next decade and offers specific steps that organizations can take to improve consumer confidence, maintain the flow of information they need, yet still demonstrate their compliance with consumer expectations as well as the law. Two appendices contain the full text of two documents vital to senior managers mapping their own corporate strategies: the European Union Data Directive and an EU Work Paper on the use of contracts to ensure the security of personally identifiable information that is transferred from the EU to other countries, such as the U.S., that lack their own adequate protections.

Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation... Storage Management in Data Centers - Understanding, Exploiting, Tuning, and Troubleshooting Veritas Storage Foundation (Hardcover, 2009 ed.)
Volker Herminghaus, Albrecht Scriba
R2,298 R1,682 Discovery Miles 16 820 Save R616 (27%) Ships in 10 - 15 working days

Storage Management in Data Centers helps administrators tackle the complexity of data center mass storage. It shows how to exploit the potential of Veritas Storage Foundation by conveying information about the design concepts of the software as well as its architectural background. Rather than merely showing how to use Storage Foundation, it explains why to use it in a particular way, along with what goes on inside. Chapters are split into three sections: An introductory part for the novice user, a full-featured part for the experienced, and a technical deep dive for the seasoned expert. An extensive troubleshooting section shows how to fix problems with volumes, plexes, disks and disk groups. A snapshot chapter gives detailed instructions on how to use the most advanced point-in-time copies. A tuning chapter will help you speed up and benchmark your volumes. And a special chapter on split data centers discusses latency issues as well as remote mirroring mechanisms and cross-site volume maintenance. All topics are covered with the technical know how gathered from an aggregate thirty years of experience in consulting and training in data centers all over the world.

Security and Privacy of Electronic Healthcare Records - Concepts, paradigms and solutions (Hardcover): Sudeep Tanwar, Sudhanshu... Security and Privacy of Electronic Healthcare Records - Concepts, paradigms and solutions (Hardcover)
Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
R3,437 R3,102 Discovery Miles 31 020 Save R335 (10%) Ships in 18 - 22 working days

Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage. With the development of the IoT, the Cloud and Smart Cities frameworks, new privacy and security methods are being pursued to secure healthcare-based systems and platforms. Presenting a detailed framework as well as comparative case studies for security protection, data integrity, privacy preservation, scalability, and healthcare legislation, this edited volume covers state of the art research and addresses privacy and security methods and technologies for EHRs.

Information Warfare (Paperback): William Hutchinson, Matthew Warren Information Warfare (Paperback)
William Hutchinson, Matthew Warren
R1,721 Discovery Miles 17 210 Ships in 10 - 15 working days

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.
This book will be of interest to executives and managers in any public or private organization. Specifically, managers or staff in the areas of information technology, security, knowledge management, public relations, or marketing should find it directly useful.
Its main purpose is to make readers aware of the new world of information saturation; thus decreasing the chance that they will become victims of those abusing the information age, whilst at the same time increasing their chances of benefiting from the new opportunities produced.
Addresses the issues and implications of cyber warfare and how it directly impacts on companies

Recommender Systems in Fashion and Retail - Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022)... Recommender Systems in Fashion and Retail - Proceedings of the Fourth Workshop at the Recommender Systems Conference (2022) (Hardcover, 1st ed. 2023)
Humberto Jesus Corona Pampin, Reza Shirvany
R3,644 Discovery Miles 36 440 Ships in 10 - 15 working days

This book includes the proceedings of the fourth workshop on recommender systems in fashion and retail (2022), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field. Recommender systems are often used to solve different complex problems in this scenario, such as product recommendations, size and fit recommendations, and social media-influenced recommendations (outfits worn by influencers).

Data Science and Big Data Analytics in Smart Environments (Hardcover): Marta Chinnici, Florin Pop, Catalin Negru Data Science and Big Data Analytics in Smart Environments (Hardcover)
Marta Chinnici, Florin Pop, Catalin Negru
R4,561 Discovery Miles 45 610 Ships in 9 - 17 working days

Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services. Data grows rapidly, since applications produce continuously increasing volumes of both unstructured and structured data. Large-scale interconnected systems aim to aggregate and efficiently exploit the power of widely distributed resources. In this context, major solutions for scalability, mobility, reliability, fault tolerance and security are required to achieve high performance and to create a smart environment. The impact on data processing, transfer and storage is the need to re-evaluate the approaches and solutions to better answer the user needs. A variety of solutions for specific applications and platforms exist so a thorough and systematic analysis of existing solutions for data science, data analytics, methods and algorithms used in Big Data processing and storage environments is significant in designing and implementing a smart environment. Fundamental issues pertaining to smart environments (smart cities, ambient assisted leaving, smart houses, green houses, cyber physical systems, etc.) are reviewed. Most of the current efforts still do not adequately address the heterogeneity of different distributed systems, the interoperability between them, and the systems resilience. This book will primarily encompass practical approaches that promote research in all aspects of data processing, data analytics, data processing in different type of systems: Cluster Computing, Grid Computing, Peer-to-Peer, Cloud/Edge/Fog Computing, all involving elements of heterogeneity, having a large variety of tools and software to manage them. The main role of resource management techniques in this domain is to create the suitable frameworks for development of applications and deployment in smart environments, with respect to high performance. The book focuses on topics covering algorithms, architectures, management models, high performance computing techniques and large-scale distributed systems.

Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover): Deepak Kumar Sharma, Koyel... Green Computing in Network Security - Energy Efficient Solutions for Business and Home (Hardcover)
Deepak Kumar Sharma, Koyel Datta Gupta, Rinky Dwivedi
R3,300 Discovery Miles 33 000 Ships in 9 - 17 working days

This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices. Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.

Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023): Kui Ren, Cong Wang Searchable Encryption - From Concepts to Systems (Hardcover, 1st ed. 2023)
Kui Ren, Cong Wang
R3,650 Discovery Miles 36 500 Ships in 10 - 15 working days

This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.

EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.): It Governance... EU General Data Protection Regulation (GDPR) - An implementation and compliance guide (Paperback, 4th ed.)
It Governance Privacy Team
R1,240 Discovery Miles 12 400 Ships in 18 - 22 working days

Understand your GDPR obligations and prioritise the steps you need to take to comply The GDPR gives individuals significant rights over how their personal information is collected and processed, and places a range of obligations on organisations to be more accountable for data protection. The Regulation applies to all data controllers and processors that handle EU residents' personal information. It supersedes the 1995 EU Data Protection Directive and all EU member states' national laws that are based on it - including the UK's DPA (Data Protection Act) 1998. Failure to comply with the Regulation could result in fines of up to 20 million or 4% of annual global turnover - whichever is greater. This guide is a perfect companion for anyone managing a GDPR compliance project. It provides a detailed commentary on the Regulation, explains the changes you need to make to your data protection and information security regimes, and tells you exactly what you need to do to avoid severe financial penalties. Clear and comprehensive guidance to simplify your GDPR compliance project Now in its fourth edition, EU General Data Protection Regulation (GDPR) - An implementation and compliance guide provides clear and comprehensive guidance on the GDPR. It explains the Regulation and sets out the obligations of data processors and controllers in terms you can understand. Topics covered include: The DPO (data protection officer) role, including whether you need one and what they should do; Risk management and DPIAs (data protection impact assessments), including how, when and why to conduct one; Data subjects' rights, including consent and the withdrawal of consent, DSARs (data subject access requests) and how to handle them, and data controllers and processors' obligations; Managing personal data internationally, including updated guidance following the Schrems II ruling; How to adjust your data protection processes to comply with the GDPR, and the best way of demonstrating that compliance; and A full index of the Regulation to help you find the articles and stipulations relevant to your organisation. Supplemental material While most of the EU GDPR's requirements are broadly unchanged in the UK GDPR, the context is quite different and will have knock-on effects. You may need to update contracts regarding EU-UK data transfers, incorporate standard contractual clauses into existing agreements, and update your policies, processes and procedural documentation as a result of these changes. We have published a supplement that sets out specific extra or amended information for this pocket guide. Click here to download the supplement. About the authors The IT Governance Privacy Team, led by Alan Calder, has substantial experience in privacy, data protection, compliance and information security. This practical experience, their understanding of the background and drivers for the GDPR, and the input of expert consultants and trainers are combined in this must-have guide to GDPR compliance. Start your compliance journey now and buy this book today.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
Deaver on Cybersecurity - An irreverent…
Frederic Scott Deaver Hardcover R1,808 Discovery Miles 18 080
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,311 Discovery Miles 73 110
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,400 Discovery Miles 34 000
Coding for Penetration Testers…
Jason Andress, Ryan Linn Paperback R1,040 Discovery Miles 10 400
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
Hacking - 17 Must Tools every Hacker…
Alex Wagner Hardcover R940 R808 Discovery Miles 8 080
Handbook of Research on Intelligent Data…
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi Hardcover R9,365 Discovery Miles 93 650
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R7,215 Discovery Miles 72 150

 

Partners