The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations.
Managing Legal and Security Risks in Computing and Communications will:
- Help you quickly locate pertinent laws
- Provide guidance on the laws
- Present a legal reference for developing training material
- Help you foster a continuing dialog with legal counsel
Computer Protection and Legal Liability Risks Reducing Liability Risks: Compliance Programs Protecting Intellectual Property Rights Trade Secrets Trademarks and Patents Copyrights Information Privacy and Confidentiality Records Management Disaster Planning for Information Systems Electronic Commerce E-mail Policy Guide Creating and Managing a Website Computer Crime Law Federal Sentencing Guidelines for Individuals and Organizations Shoehorn Laws: Federal Statutes Used to Prosecute Computer-related Crime State Computer Crime Statutes Discovery and Computer Evidence Technical Standards for Computing and Communications Security