Information Security Law - The Emerging Standard for Corporate Compliance
BIC: COMPUTER SECURITY, Confidential information law
BISAC: BUSINESS & ECONOMICS / Business Law, LAW / Computer & Internet, LAW / General Practice
Published: 07 Oct 2008
In today’s business environment, virtually all of a company’s daily transactions and all of its key records are created, used, communicated, and stored in electronic form using networked computer technology. Most business entities are, quite literally, fully dependent upon information technology and an interconnected information infrastructure.
While this reliance on technology provides tremendous economic benefits, it also creates significant potential vulnerabilities that can lead to major harm to a company and its various stakeholders. As a result, public policy concerns regarding these risks are driving the enactment of numerous laws and regulations that require businesses to adequately address the security of their own data.
Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide.
This book takes a high level view of the multitude of security laws and regulations, and summarises the global legal framework for information security that emerges from them. It is written for companies struggling to comply with several information security laws in multiple jurisdictions, as well as for companies that want to better understand their obligations under a single law. It explains the common approach of most security laws, and seeks to help businesses understand the issues that they need to address to become generally legally compliant.
Benefit from a thorough grounding in the developing law of information security and understand what it means for your organisation.
1: Security basics: The legal perspective
2: Legal response to security
3: The general duty to provide security
4: The legal standard for compliance
5: Developing a compliant security program
6: Security controls to consider
7: The role of standards
8: Security breach notification