Building Effective Privacy Programs : Cybersecurity from Principles to Practice
Building Effective Privacy Programs : Cybersecurity from Principles to Practice
Click to enlarge
Author(s): Edwards, Jason
Weaver
Weaver, Griffin
ISBN No.: 9781394342631
Pages: 448
Year: 202510
Format: Trade Cloth (Hard Cover)
Price: $ 150.08
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Table of contents Preface Chapter 1 - Introduction to Privacy Definition and Importance of Privacy Historical Perspective on Privacy Modern Privacy Challenges Recommendations Chapter Conclusion Questions Chapter 2 - Understanding Personal Data Definition and Types of Personal Data Sensitive Personal Data Data Combinations and Anonymization Recommendations Chapter Conclusion Questions Chapter 3 - Data Processing Definition and Types of Processing Legal Bases for Processing Data Processing Principles Recommendations Chapter Conclusion Questions Chapter 4 - Roles and Relationships Data Controller vs. Data Processor Sub-Processors Data Subjects and Their Rights Recommendations Chapter Conclusion Questions Chapter 5 - Privacy Impact Assessments (PIA) Purpose and Benefits of PIA Conducting a Privacy Impact Assessment (PIA) Importance of Stakeholder Involvement PIA Templates and Examples Recommendations Chapter Conclusion Questions Chapter 6 - Roles in Privacy Leadership Chief Privacy Officer (CPO) Chief Information Security Officer (CISO) Data Protection Officer (DPO) Privacy Champions Privacy Engineers Recommendations Chapter Conclusion Questions Chapter 7 - Data Subject Rights (DSR) Data Subject Rights (DSR) Handling Data Subject Requests DSR Tools and Techniques Recommendations Chapter Conclusion Questions Chapter 8 - Privacy Frameworks and Standards NIST Privacy Framework: Mapping Organizational Practices to the Framework ISO/IEC 27701 Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD Recommendations Chapter Conclusion Questions Chapter 9 - Major Privacy Laws and Regulations Major Privacy Laws and Regulations California Consumer Privacy Act (CCPA) Health Insurance Portability and Accountability Act (HIPAA) Comparative Analysis of Global Regulations Recommendations Chapter Conclusion Questions Chapter 10 - International Privacy Concerns Cross-Border Data Transfers Adequacy Decisions Binding Corporate Rules and Standard Contractual Clauses Recommendations Chapter Conclusion Questions Chapter 11 - Regulatory Enforcement Role of Data Protection Authorities International Cooperation Between Authorities Guidance on Emerging Issues Enforcement Actions and Penalties High-Profile Cases and Their Implications Appeals and Legal Remedies Case Studies of Regulatory Actions Recommendations Chapter Conclusion Questions Chapter 12 - Privacy by Design and Default Principles of Privacy by Design Embedding Privacy in Organizational Culture Lifecycle Management of Personal Data User-Centric Privacy Controls Implementing Privacy by Default Case Studies and Best Practices Recommendations Chapter Conclusion Questions Chapter 13 - Privacy Technology and Tools Privacy Enhancing Technologies (PETs): Anonymization vs. Pseudonymization Data Masking and Encryption Privacy Management Software Recommendations Chapter Conclusion Questions Chapter 14 - Data Breach Management Identifying and Responding to Data Breaches Notification Requirements Post-Breach Remediation Recommendations Chapter Conclusion Questions Chapter 15 - Emerging Privacy Trends Artificial Intelligence and Privacy Internet of Things (IoT) and Privacy Blockchain and Privacy Recommendations Chapter Conclusion Questions Chapter 16 - Privacy Program Implementation Establishing a Privacy Governance Structure Developing Privacy Policies and Procedures Implementing Privacy Controls and Measures Monitoring and Reporting on Privacy Compliance Continuous Improvement of the Privacy Program Recommendations Chapter Conclusion Questions Chapter 17 - Privacy Training and Awareness Developing Effective Privacy Training Programs Engaging Employees in Privacy Awareness Training Tools and Resources Sample Annual Privacy Training Plan Recommendations Chapter Conclusion Questions Chapter 18 - Privacy Audits & Assessments Privacy Audits and Assessments Using Assessment Tools Integrating Assessments with Risk Management Reporting and Follow-Up Actions Recommendations Chapter Conclusion Questions Answers Index.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...