Managing Legal and Security Risks in Computers and CommunicationsBy
- Paul Shaw, Editor and publisher of Computing & Communications: Law and Protection, Financial Fraud, and Assets Protection, the latter periodical covering organizational integrity compliance. He is the coauthor of Corporate Crime Investigation, Fraud Awareness Manual, and Forensic Accounting Handbook.
The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations.Managing Legal and Security Risks in Computing and Communications will: · help you quickly locate pertinent laws· provide guidance on the laws· present a legal reference for developing training material· help you foster a continuing dialog with legal counsel
Security managers, information security specialists
Paperback, 256 Pages
Published: December 1997
Imprint: Butterworth Heinemann
"...the book provides worthwhile information that would benefit any organization with responsibility for computing and communications." - Security Management
- Computer Protection and Legal Liability Risks; Reducing Liability Risks: Compliance Programs; Protecting Intellectual Property Rights; Trade Secrets; Trademarks and Patents; Copyrights; Information Privacy and Confidentiality; Records Management; Disaster Planning for Information Systems; Electronic Commerce; E-mail Policy Guide; Creating and Managing a Website; Computer Crime Law; Federal Sentencing Guidelines for Individuals and Organizations; Shoehorn Laws: Federal Statutes Used to Prosecute Computer-related Crime; State Computer Crime Statutes; Discovery and Computer Evidence; Technical Standards for Computing and Communications Security.