Listing 1 - 10 of 32 | << page >> |
Sort by
|
Choose an application
Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the "privacy enforcement gap"-the disparity between the privacy on the books, and the privacy on the ground.
Data Privacy --- Data Protection --- Data Regulation --- Digital Divide --- Globalization --- Governance --- Information and Communication Technologies --- International Economics and Trade --- International Trade and Trade Rules --- Trade --- WDR Background Paper
Choose an application
A robust data governance regulatory environment, encompassing both safeguards that protect the rights of market players and enablers that facilitate use/reuse of data, provide an important foundation for trust in the data economy. This paper presents the methodology and findings from a Global Data Regulation Diagnostic. The Global Data Regulation diagnostic is a detailed assessment of laws and regulations on data governance, covering both safeguards and enablers for data governance across 80 countries ranging from low to high income groups. Diagnostic results show that countries have put in greater effort in adopting enabling regulations than regulatory safeguards. However, the development of both enablers and safeguards remains at an intermediate stage: only 41 percent of good practices for safeguards and 47 percent for enablers have been adopted across countries. The diagnostic identifies gaps in the regulatory framework across several important dimensions including safeguards for personal and nonpersonal data, cross-border data flows and cybersecurity, as well as enablers for public and private intent data, as well as e-commerce. While higher income countries are typically more advanced than their lower income counterparts, significant gaps nonetheless remain in the regulatory framework for data across all income groups.
Choose an application
This comprehensive textbook discusses the legal, organizational and ethical aspects of information governance, assurance and security and their relevance to all aspects of information work. Information governance describes the activities and practices which have developed to control the use of information, including, but not limited to, practices mandated by law. In a world in which information is increasingly seen as a top-level asset, the safeguarding and management of information is of concern to everyone. From the researcher who is responsible for ethical practices in the gathering, analysis, and storage of data, to the reference librarian who must deliver unbiased information; from the records manager who must respond to information requests, to the administrator handling personnel files, this book with equip practitioners and students alike to implement good information governance practice in real-world situations.
Information resources management. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Corporations --- Information resource management --- Information systems management --- IRM (Information resources management) --- Management --- Management information systems --- Information resources management --- Data protection --- E-books
Choose an application
This book provides helpful guidance on the importance of clearly defining policies; logging gifts and hospitality in auditable records; ensuring a consistent approach across the organisation; controls for contractors; facilitation payments; and charitable and political donations.
Information technology --- Computer security --- Computer networks --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer network security --- Network security, Computer --- Security of computer networks --- Security measures. --- Management. --- Data protection --- Security measures --- Management --- E-books
Choose an application
While regulations on personal data diverge widely between countries, it is nonetheless possible to identify three main models based on their distinctive features: one model based on open transfers and processing of data, a second model based on conditional transfers and processing, and third a model based on limited transfers and processing. These three data models have become a reference for many other countries when defining their rules on the cross-border transfer and domestic processing of personal data. The study reviews their main characteristics and systematically identifies for 116 countries worldwide to which model they adhere for the two components of data regulation (i.e. cross-border transfers and domestic processing of data). In a second step, using gravity analysis, the study estimates whether countries sharing the same data model exhibit higher or lower digital services trade compared to countries with different regulatory data models. The results show that sharing the open data model for cross-border data transfers is positively associated with trade in digital services, while sharing the conditional model for domestic data processing is also positively correlated with trade in digital services. Country-pairs sharing the limited model, instead, exhibit a double whammy: they show negative trade correlations throughout the two components of data regulation. Robustness checks control for restrictions in digital services, the quality of digital infrastructure, as well as for the use of alternative data sources.
Data Privacy --- Data Protection --- Data Regulation --- Digital Services --- Globalization --- ICT Legal and Regulatory Framework --- Information and Communication Technologies --- International Economics and Trade --- International Trade and Trade Rules --- Trade --- Trade and Services --- WDR Background Paper
Choose an application
In this book, the Permanent Subcommittee on Investigations of the U.S. Senate Homeland Security and Governmental Affairs Committee examine issues of consumer privacy and security on the Internet and in the broader online economy. Central to this segment of the economy is the online advertising industry, which continues to grow in importance. In 2013, U.S. online advertising revenue for the first time surpassed that of broadcast television advertising as companies spent nearly 43 billion to reach consumers. The online advertising ecosystem is highly complex. Online advertisers do far more than
Information technology --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security measures. --- Computer networks --- Data protection --- Internet advertising --- Advertising --- Electronic commerce --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures --- E-books
Choose an application
This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
Business enterprises --- Computer security --- Data protection --- Computer crimes --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer networks --- Security measures. --- Management. --- Economic aspects. --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Computer networks&delete& --- Security measures --- Management --- Economic aspects --- E-books
Choose an application
Aligned with the latest iteration of the Standard - ISO 27001:2013 - this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language.
Data protection. --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures --- Computer security --- Management --- Standards --- E-books
Choose an application
ISO 9001 Standard. --- Computer security --- Data protection --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- International Organization for Standardization 9001 Standard --- ISO Standard 9001 --- ISO 9000 Series Standards --- Quality assurance --- Standards. --- ISO 9001 Standard --- Standards --- E-books
Choose an application
More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation's use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.
Cloud computing. --- Education, Higher -- Effect of technological innovations on -- United States. --- Web services. --- Data protection --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Security systems --- Hacking --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection --- Security measures --- E-books
Listing 1 - 10 of 32 | << page >> |
Sort by
|