Building Effective Privacy Programs : Cybersecurity from Principles to Practice

個数:
電子版価格
¥14,314
  • 電子版あり
  • ポイントキャンペーン

Building Effective Privacy Programs : Cybersecurity from Principles to Practice

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • ≪洋書のご注文について≫ 「海外取次在庫あり」「国内在庫僅少」および「国内仕入れ先からお取り寄せいたします」表示の商品でもクリスマス前(12/20~12/25)および年末年始までにお届けできないことがございます。あらかじめご了承ください。

  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 448 p.
  • 言語 ENG
  • 商品コード 9781394342631

Full Description

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape

In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy.

Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more.

Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs:

Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics
Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications
Offers strategies to integrate privacy principles into business processes and IT systems
Covers industry-specific applications for healthcare, finance, and technology sectors
Highlights successful privacy program implementations and lessons learned from enforcement actions
Includes glossaries, comparison charts, sample policies, and additional resources for quick reference

Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

Contents

Preface xi

Acknowledgement xiii

1 Introduction to Privacy 1

Definition and Importance of Privacy 1

Historical Perspective on Privacy 5

Modern Privacy Challenges 10

Recommendations 16

Chapter Conclusion 17

Questions 17

2 Understanding Personal Data 21

Definition and Types of Personal Data 21

Sensitive Personal Data 27

Data Combinations and Anonymization 32

Recommendations 37

Chapter Conclusion 38

Questions 38

3 Data Processing 41

Definition and Types of Processing 42

Legal Bases for Processing 48

Data Processing Principles 54

Recommendations 60

Chapter Conclusion 60

Questions 61

4 Roles and Relationships 65

Data Controller vs. Data Processor 65

Subprocessors 75

Data Subjects and Their Rights 80

Recommendations 84

Chapter Conclusion 85

Questions 86

5 Privacy Impact Assessments 89

Purpose and Benefits of PIA 89

Conducting a PIA 94

Example of PIA 96

PIA Templates and Examples 101

Recommendations 107

Chapter Conclusion 108

Questions 109

6 Roles in Privacy Leadership 113

Chief Privacy Officer 113

Chief Information Security Officer 116

Data Protection Officer 118

Privacy Champions 121

Privacy Engineers 123

Recommendations 127

Chapter Conclusion 129

Questions 129

7 Data Subject Rights 133

Foundational Frameworks 133

Handling Data Subject Requests 140

DSR Tools and Techniques 145

Recommendations 151

Chapter Conclusion 152

Questions 152

8 Privacy Frameworks and Standards 157

NIST Privacy Framework: Mapping Organizational Practices to the Framework 157

Iso/iec 27701 160

Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD 166

Recommendations 172

Chapter Conclusion 173

Questions 174

9 Major Privacy Laws and Regulations 177

Laws and Regulations 177

California Consumer Privacy Act 185

Health Insurance Portability and Accountability Act 190

Comparative Analysis of Global Regulations 198

Recommendations 200

Chapter Conclusion 201

Questions 202

10 International Privacy Concerns 205

Cross-Border Data Transfers 205

Adequacy Decisions 213

BCRs and SCCs 218

Recommendations 223

Chapter Conclusion 224

Questions 225

11 Regulatory Enforcement 229

Role of DPAs 229

Case Studies of Regulatory Actions 240

Recommendations 244

Chapter Conclusion 246

Questions 246

12 Privacy by Design and Default 251

Principles of Privacy by Design 251

Implementing Privacy by Default 255

Case Studies and Best Practices 258

Recommendations 262

Chapter Conclusion 263

Questions 263

13 Privacy Technology and Tools 267

PETs: Anonymization vs. Pseudonymization 267

Data Masking and Encryption 270

Privacy Management Software 275

Recommendations 278

Chapter Conclusion 280

Questions 280

14 Data Breach Management 283

Identifying and Responding to Data Breaches 283

Notification Requirements 288

Postbreach Remediation 292

Recommendations 296

Chapter Conclusion 298

Questions 298

15 Emerging Privacy Trends 301

AI and Privacy 301

IoT and Privacy 305

Blockchain and Privacy 310

Recommendations 315

Chapter Conclusion 316

Questions 317

16 Privacy Program Implementation 321

Establishing a Privacy Governance Structure 321

Developing Privacy Policies and Procedures 326

Implementing Privacy Controls and Measures 333

Monitoring and Reporting on Privacy Compliance 339

Continuous Improvement of the Privacy Program 346

Recommendations 354

Chapter Conclusion 355

Questions 356

17 Privacy Training and Awareness 359

Developing Effective Privacy Training Programs 359

Engaging Employees in Privacy Awareness 364

Training Tools and Resources 368

Sample Annual Privacy Training Plan 369

Recommendations 372

Chapter Conclusion 373

Questions 373

18 Privacy Audits and Assessments 377

Essential Program Components 377

Using Assessment Tools 382

Integrating Assessments with Risk Management 385

Reporting and Follow-Up Actions 387

Recommendations 389

Chapter Conclusion 390

Questions 390

Answers 395

Index 421

最近チェックした商品