You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions »

Book cover image of The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions by Rebecca Herold

Authors: Rebecca Herold, Edward H. Freeman
ISBN-13: 9780849312489, ISBN-10: 0849312485
Format: Hardcover
Publisher: Taylor & Francis, Inc.
Date Published: December 2001
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Rebecca Herold

Book Synopsis

Today, more than ever, organizations have to cope with increased concerns regarding privacy issues. These concerns are not limited to consumer fears about how information collected by Web sites will be used or misused. They also involve broader issues, including data collected for direct response marketing, privacy of financial and health records, identity theft, and fraud. Employees are raising questions about acceptable use of phones, e-mail, the Web, and if and when employers can monitor use. Employers find that without policies governing use of these assets, they have no legal basis for action against employees.

The Privacy Papers: Managing Technology, Consumer, Employee, and Legislative Actions is a book for C-level executives, IT managers, HR managers, security officers, privacy officers, and legal professionals. It covers all aspects of technology and legislation that enable privacy and also those that place it at risk. This how-to guide presents sample policies for employee training, awareness, and acceptable use; covers why companies must protect data and how to do it; describes the technology that makes information more private; and lists and summarizes major federal and international privacy legislation.

Corporate espionage can put sensitive company information such as intellectual property, product development, marketing plans, and customer files at risk. With the ever-increasing legislation concerning privacy, it is important for executives to stay up to date. The Privacy Papers will ensure that any company conducting business domestically or internationally will understand how policies governing use of their assets will affect daily operations.

Table of Contents

Forewordxv
Prefacexix
Introductionxxi
Section IBusiness Organization Issues1
Part AE-Mail Policies
Chapter 1E-Mail: Balancing Corporate Assets and Employee Privacy3
Chapter 2Control Issues in an E- Mail Personal Privacy Invasion Prevention Policy15
Part BMonitoring Policies
Chapter 3Developing an Organizational Internet Policy23
Chapter 4Computer Forensics and Privacy: At What Price Do We Police the Internet?33
Part CCustomer Web Privacy Policies
Chapter 5Policies for Secure Personal Data41
Part DEducation and Awareness Training
Chapter 6Making Security Awareness Happen51
Part EKeeping Personal Information Private
Chapter 7The Case for Privacy85
Part FAttorney--Client Privilege and Electronic Communications
Chapter 8Attorney--Client Privilege and Electronic Data Transmission93
Part GCorporate Spies
Chapter 9Computer Crime and Analysis of Computer Evidence: It Ain't Just Hackers and Phreakers Anymore!103
Chapter 10A Tale of Two Spies: The Outside Hacker and the Trusted Insider111
Part HAuditing and Privacy
Chapter 11Federal Laws Affecting IS Auditors117
Part IComputer Forensics
Chapter 12Computer Forensics135
Part JElectronic Identifiers
Chapter 13The Dangerous Precedent Set in the Use of Electronic Identifiers151
Part KInternational Communications
Chapter 14Jurisdictional Issues in Global Transmissions161
Part LAnonymous Internet Activity
Chapter 15Anonymity on the Internet: ACLU of Georgia v. Miller173
Part ME-Commerce and Confidentiality Issues
Chapter 16The Continuing Disintegration of Confidentiality181
Chapter 17Selected Security and Legal Issues in E-Commerce189
Part NInformation Security and Privacy Officer Roles
Chapter 18Security Awareness Program and Information Security Roles199
Chapter 19Information Security Standards: Deluge and Dearth215
Chapter 20The Role of the Chief Medical Information Officer223
Part OHealth-Related Information
Chapter 21Information Security Management in the Healthcare Industry239
Part PCriminal Internet Activity
Chapter 22Criminal Activity on the Internet255
Part QIdentity Theft
Chapter 23Identity Theft: Who Are You Anyway?267
Chapter 24ID Theft: When Bad Things Happen to Your Good Name275
Part RLegal Primer for ISPs
Chapter 25To Disclose or Not to Disclose: A Legal Primer for ISPs299
Section IITools and Related Technology315
Part AEncryption and Cryptography
Chapter 26Selecting a Cryptographic System317
Part BSteganography
Chapter 27A New Paradigm Hidden in Steganography331
Part CCookies and Profiling
Chapter 28Cookies and Web Bugs: What They Are and How They Work Together351
Chapter 29Online Profiling: Benefits and Concerns365
Part DMonitoring and Content Filtering
Chapter 30Where Is the IDS?377
Chapter 31Internet Acceptable Use Policies: Navigating the Management, Legal, and Technical Issues385
Chapter 32Ethics and the Internet395
Part EWireless Communications
Chapter 33Security of Wireless Local Area Networks411
Part FData Mining and Customer Retention Management
Chapter 34Customer Relationship Management and Data Warehousing421
Part GThird-Party Assurance Privacy and Security Certifications
Chapter 35Anonymity, Privacy, and Trust431
Chapter 36Web Certification: A Benchmark for Trustworthy Commerce437
Part HConfidentiality Agreements
Chapter 37Get It in Writing443
Section IIIUnited States of America Laws and Issues447
Part AHealth Insurance Portability and Accountability Act of 1996 (HIPAA)
Chapter 38Standards for Privacy of Individually Identifiable Health Information449
Chapter 39Health Privacy Regulation Enhances Protection of Patient Records but Raises Practical Concerns493
Part BGramm--Leach--Bliley Act (GLB) (1999)
Chapter 40Financial Services Modernization Act509
Chapter 41Gramm--Leach--Bliley (GLB) Financial Services Modernization Act517
Part COverviews of other U.S. Privacy-Related Laws and Regulations
Chapter 42Overviews of Privacy-Related U.S. Laws and Regulations529
Part DBills Under Consideration
Chapter 43U.S. Bills Under Consideration539
Part EGovernment Surveillance on the Internet
Chapter 44Internet Security and Privacy543
Chapter 45Independent Review of the Carnivore System for the Department of Justice555
Section IVInternational Laws and Issues567
Part AEuropean Union Data Protection Directive (1995)
Chapter 46The European Data Protection Directive: A Roadblock to International Trade?569
Chapter 47Data Privacy Directive 95/46 EC: Protecting Personal Data and Ensuring Free Movement of Data583
Part BSafe Harbor
Chapter 48Safe Harbor Overview619
Part CLists and Overviews of Other International Laws, Regulations and Issues
Chapter 49International Privacy Laws625
Section VAppendix633
Chapter 50Privacy Resources635
About the Editor639
Index641

Subjects