Managing Legal and Security Risks in Computers and Communications
- Paul Shaw, Editor and publisher of Computing & Communications: Law and Protection, Financial Fraud, and Assets Protection, the latter periodical covering organizational integrity compliance. He is the coauthor of Corporate Crime Investigation, Fraud Awareness Manual, and Forensic Accounting Handbook.
The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations.Managing Legal and Security Risks in Computing and Communications will: · help you quickly locate pertinent laws· provide guidance on the laws· present a legal reference for developing training material· help you foster a continuing dialog with legal counselView full description
Security managers, information security specialists
- Published: December 1997
- Imprint: BUTTERWORTH HEINEMANN
- ISBN: 978-0-7506-9938-9
"...the book provides worthwhile information that would benefit any organization with responsibility for computing and communications." - Security Management
Table of ContentsComputer Protection and Legal Liability Risks; Reducing Liability Risks: Compliance Programs; Protecting Intellectual Property Rights; Trade Secrets; Trademarks and Patents; Copyrights; Information Privacy and Confidentiality; Records Management; Disaster Planning for Information Systems; Electronic Commerce; E-mail Policy Guide; Creating and Managing a Website; Computer Crime Law; Federal Sentencing Guidelines for Individuals and Organizations; Shoehorn Laws: Federal Statutes Used to Prosecute Computer-related Crime; State Computer Crime Statutes; Discovery and Computer Evidence; Technical Standards for Computing and Communications Security.