Legal issues in information security /
by Grama, Joanna Lyn; Books24x7, Inc.
Material type: BookSeries: Jones & Bartlett Learning information systems security & assurance series: Publisher: Burlington, MA : Jones & Bartlett Learning, 2011Edition: 2nd ed.Description: xvi, 525 p. ; 25 cm.Subject(s): Information storage and retrieval systems -- United States -- Security measures -- Law and legislation | Information storage and retrieval systems -- United States -- Law and legislation | Data protection -- Law and legislation -- United States | Electronic books | Electronic booksOnline resources: Click here for full text. Available also in a print ed.Summary: This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. -- Edited summary from book.Item type | Current location | Collection | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Books | Dhaka University Library General Stacks | Non Fiction | 349.73 GRL (Browse shelf) | Available | 476461 |
Includes bibliographical references and index.
Text.
This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. -- Edited summary from book.
Available also in a print ed.
Mode of access: Internet via World Wide Web.
Digitized and made available by: Books24x7.com.
There are no comments for this item.