Weaver / Edwards | Building Effective Privacy Programs | Buch | 978-1-394-34263-1 | sack.de

Buch, Englisch, 480 Seiten

Weaver / Edwards

Building Effective Privacy Programs

Cybersecurity from Principles to Practice
1. Auflage 2025
ISBN: 978-1-394-34263-1
Verlag: John Wiley & Sons Inc

Cybersecurity from Principles to Practice

Buch, Englisch, 480 Seiten

ISBN: 978-1-394-34263-1
Verlag: John Wiley & Sons Inc


Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape

In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy.

Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more.

Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: - Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics
- Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications
- Offers strategies to integrate privacy principles into business processes and IT systems
- Covers industry-specific applications for healthcare, finance, and technology sectors - Highlights successful privacy program implementations and lessons learned from enforcement actions
- Includes glossaries, comparison charts, sample policies, and additional resources for quick reference

Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

Weaver / Edwards Building Effective Privacy Programs jetzt bestellen!

Weitere Infos & Material


Table of contents

Preface

Chapter 1 - Introduction to Privacy

Definition and Importance of Privacy

Historical Perspective on Privacy

Modern Privacy Challenges

Recommendations

Chapter Conclusion

Questions

Chapter 2 - Understanding Personal Data

Definition and Types of Personal Data

Sensitive Personal Data

Data Combinations and Anonymization

Recommendations

Chapter Conclusion

Questions

Chapter 3 - Data Processing

Definition and Types of Processing

Legal Bases for Processing

Data Processing Principles

Recommendations

Chapter Conclusion

Questions

Chapter 4 - Roles and Relationships

Data Controller vs. Data Processor

Sub-Processors

Data Subjects and Their Rights

Recommendations

Chapter Conclusion

Questions

Chapter 5 - Privacy Impact Assessments (PIA)

Purpose and Benefits of PIA

Conducting a Privacy Impact Assessment (PIA)

Importance of Stakeholder Involvement

PIA Templates and Examples

Recommendations

Chapter Conclusion

Questions

Chapter 6 - Roles in Privacy Leadership

Chief Privacy Officer (CPO)

Chief Information Security Officer (CISO)

Data Protection Officer (DPO)

Privacy Champions

Privacy Engineers

Recommendations

Chapter Conclusion

Questions

Chapter 7 - Data Subject Rights (DSR)

Data Subject Rights (DSR)

Handling Data Subject Requests

DSR Tools and Techniques

Recommendations

Chapter Conclusion

Questions

Chapter 8 - Privacy Frameworks and Standards

NIST Privacy Framework: Mapping Organizational Practices to the Framework

ISO/IEC 27701

Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD

Recommendations

Chapter Conclusion

Questions

Chapter 9 - Major Privacy Laws and Regulations

Major Privacy Laws and Regulations

California Consumer Privacy Act (CCPA)

Health Insurance Portability and Accountability Act (HIPAA)

Comparative Analysis of Global Regulations

Recommendations

Chapter Conclusion

Questions

Chapter 10 - International Privacy Concerns

Cross-Border Data Transfers

Adequacy Decisions

Binding Corporate Rules and Standard Contractual Clauses

Recommendations

Chapter Conclusion

Questions

Chapter 11 - Regulatory Enforcement

Role of Data Protection Authorities

International Cooperation Between Authorities

Guidance on Emerging Issues

Enforcement Actions and Penalties

High-Profile Cases and Their Implications

Appeals and Legal Remedies

Case Studies of Regulatory Actions

Recommendations

Chapter Conclusion

Questions

Chapter 12 - Privacy by Design and Default

Principles of Privacy by Design

Embedding Privacy in Organizational Culture

Lifecycle Management of Personal Data

User-Centric Privacy Controls

Implementing Privacy by Default

Case Studies and Best Practices

Recommendations

Chapter Conclusion

Questions

Chapter 13 - Privacy Technology and Tools

Privacy Enhancing Technologies (PETs): Anonymization vs. Pseudonymization

Data Masking and Encryption

Privacy Management Software

Recommendations

Chapter Conclusion

Questions

Chapter 14 - Data Breach Management

Identifying and Responding to Data Breaches

Notification Requirements

Post-Breach Remediation

Recommendations

Chapter Conclusion

Questions

Chapter 15 - Emerging Privacy Trends

Artificial Intelligence and Privacy

Internet of Things (IoT) and Privacy

Blockchain and Privacy

Recommendations

Chapter Conclusion

Questions

Chapter 16 - Privacy Program Implementation

Establishing a Privacy Governance Structure

Developing Privacy Policies and Procedures

Implementing Privacy Controls and Measures

Monitoring and Reporting on Privacy Compliance

Continuous Improvement of the Privacy Program

Recommendations

Chapter Conclusion

Questions

Chapter 17 - Privacy Training and Awareness

Developing Effective Privacy Training Programs

Engaging Employees in Privacy Awareness

Training Tools and Resources

Sample Annual Privacy Training Plan

Recommendations

Chapter Conclusion

Questions

Chapter 18 - Privacy Audits & Assessments

Privacy Audits and Assessments

Using Assessment Tools

Integrating Assessments with Risk Management

Reporting and Follow-Up Actions

Recommendations

Chapter Conclusion

Questions

Answers

Index


Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights.

Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.