9781955976114-1955976112-Data Privacy Program Guide: How to Build a Privacy Program that Inspires Trust

Data Privacy Program Guide: How to Build a Privacy Program that Inspires Trust

ISBN-13: 9781955976114
ISBN-10: 1955976112
Author: Bill Bonney, Matt Stamper, David Goodman, Justine Phillips
Publication date: 2022
Publisher: CISO DRG
Format: Paperback 501 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $48.29 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $49.57 USD
Buy

From $49.57

Rent

From $48.29

Book details

ISBN-13: 9781955976114
ISBN-10: 1955976112
Author: Bill Bonney, Matt Stamper, David Goodman, Justine Phillips
Publication date: 2022
Publisher: CISO DRG
Format: Paperback 501 pages

Summary

Data Privacy Program Guide: How to Build a Privacy Program that Inspires Trust (ISBN-13: 9781955976114 and ISBN-10: 1955976112), written by authors Bill Bonney, Matt Stamper, David Goodman, Justine Phillips, was published by CISO DRG in 2022. With an overall rating of 4.3 stars, it's a notable title among other Internet, Groupware, & Telecommunications (Networking & Cloud Computing, Internet & Social Media, Privacy & Online Safety, Security & Encryption) books. You can easily purchase or rent Data Privacy Program Guide: How to Build a Privacy Program that Inspires Trust (Paperback) from BooksRun, along with many other new and used Internet, Groupware, & Telecommunications books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $4.06.

Description

The topic of privacy has become a priority for boards of directors, the executive leadership team, and privacy and security leaders alike. Regulations including the European Union's General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and sector-specific regulations including the Health Insurance Portability and Accountability Act (HIPAA) all require important treatment of personal data, personal information, personally identifiable information and protected health information. Security and privacy are intertwined. As the saying goes, you can have security without privacy, but you cannot have privacy without security. Privacy, like security, is a multi-disciplinary domain that requires insight and collaboration across a host of corporate functions, including sales and marketing, legal, IT, HR, and security, among others. Similar to security, privacy has ascended as a C-level function, and consequences of poor privacy practices include damaged reputation, regulatory intervention (e.g., a consent order), fines and other financial impacts, and clearly, data breaches when sensitive information is not adequately secured throughout its lifecycle.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book