Managing Legal and Security Risks in Computers and Communications

  • ID: 1767674
  • Book
  • 256 Pages
  • Elsevier Science and Technology
1 of 4

The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations.

Managing Legal and Security Risks in Computing and Communications will:

  • Help you quickly locate pertinent laws
  • Provide guidance on the laws
  • Present a legal reference for developing training material
  • Help you foster a continuing dialog with legal counsel
  • Detailed discussion of the laws requiring organizations to retain computer security
  • Examination of Federal and State law on computer crime
  • Comprehensive, up-to-date, easy-to-read

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 4

Computer Protection and Legal Liability Risks Reducing Liability Risks: Compliance Programs Protecting Intellectual Property Rights Trade Secrets Trademarks and Patents Copyrights Information Privacy and Confidentiality Records Management Disaster Planning for Information Systems Electronic Commerce E-mail Policy Guide Creating and Managing a Website Computer Crime Law Federal Sentencing Guidelines for Individuals and Organizations Shoehorn Laws: Federal Statutes Used to Prosecute Computer-related Crime State Computer Crime Statutes Discovery and Computer Evidence Technical Standards for Computing and Communications Security

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Shaw, Paul
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll