Listing 1 - 10 of 212 | << page >> |
Sort by
|
Choose an application
Die Europäische Union erließ im Juni 2016 eine Richtlinie zum Schutz vertraulichen Know-hows und vertraulicher Geschäftsinformationen vor rechtswidrigen Handlungen, die den europaweit bislang fragmentierten Schutz vereinheitlichen soll. Die Autorin untersucht den aus der Richtlinie (EU) 2016/943 folgenden Anpassungsbedarf für das deutsche Recht. An eine kritische Würdigung des gesetzlichen Schutzes von Unternehmensgeheimnissen de lege lata schließt sich daher eine vertiefte Analyse des durch die Richtlinie vorgesehenen Schutzes und dessen Folgen für das deutsche Recht an. Die Autorin gelangt zu dem Ergebnis, dass das nunmehr europarechtlich vorgegebene Schutzniveau nur durch ein neues Gesetz zum Schutz des Unternehmensgeheimnisses erreicht werden kann.
Choose an application
Trade secrets --- Business intelligence --- Confidential business information
Choose an application
A great reminder to your employees that protecting your company's trade secrets is critical to the economic survival of both your company and our country.
Confidential business information --- Espionage --- Prevention. --- United States.
Choose an application
"The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards"--
Confidential business information --- Computer networks --- Information audits. --- Security measures.
Choose an application
Public contracts --- Confidential business information --- Government missions, American --- Auditing. --- Management --- Finance.
Choose an application
Trade secrets --- Confidential business information --- Business intelligence --- Law and legislation --- Law and legislation
Choose an application
Chemicals --- Chemical industry --- Confidential business information --- Government policy --- Government policy --- Government policy
Choose an application
Trade secrets --- Confidential business information --- Business intelligence --- Law and legislation --- Law and legislation --- United States.
Choose an application
The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary for cybersecurity—but they fail to address the everyday steps that boards, managers, and employees can take to prevent attacks. The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This book provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization’s security is only as strong as its weakest link, this book offers specific strategies for employees at every level. Drawing from her experience as CMO of one of the world’s largest cybersecurity companies, author Allison Cerra incorporates straightforward assessments, adaptable action plans, and many current examples to provide practical recommendations for cybersecurity policies. By demystifying cybersecurity and applying the central concepts to real-world business scenarios, this book will help you: Deploy cybersecurity measures using easy-to-follow methods and proven techniques Develop a practical security plan tailor-made for your specific needs Incorporate vital security practices into your everyday workflow quickly and efficiently The ever-increasing connectivity of modern organizations, and their heavy use of cloud-based solutions present unique challenges: data breaches, malicious software infections, and cyberattacks have become commonplace and costly to organizations worldwide. The Cybersecurity Playbook is the invaluable guide to identifying security gaps, getting buy-in from the top, promoting effective daily security routines, and safeguarding vital resources. Strong cybersecurity is no longer the sole responsibility of IT departments, but that of every executive, manager, and employee.
Computer security. --- Computer networks --- Corporate culture. --- Confidential business information --- Security measures.
Choose an application
Trade secrets --- Confidential business information --- Business intelligence --- Law and legislation --- United States.
Listing 1 - 10 of 212 | << page >> |
Sort by
|