Alan Tang
Privacy in Practice (eBook, PDF)
Establish and Operationalize a Holistic Data Privacy Program
36,95 €
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
36,95 €
Als Download kaufen
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
18 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
36,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
18 °P sammeln
Alan Tang
Privacy in Practice (eBook, PDF)
Establish and Operationalize a Holistic Data Privacy Program
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. This book aims at helping privacy leaders, professionals and organizations in establishing a unified, integrated, privacy program, both on a personal and enterprise-wide level.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.49MB
Andere Kunden interessierten sich auch für
- Alan TangPrivacy in Practice (eBook, ePUB)36,95 €
- Nikki RobinsonMind the Tech Gap (eBook, PDF)29,95 €
- Ulf MattssonControlling Privacy and the Use of Data Assets - Volume 1 (eBook, PDF)33,95 €
- Jim SeamanSecurity Risk Management - The Driving Force for Operational Resilience (eBook, PDF)38,95 €
- William L. JenningsFraud Investigation and Forensic Accounting in the Real World (eBook, PDF)38,95 €
- Jeff StapletonSecurity Without Obscurity (eBook, PDF)38,95 €
- Ravi DasBusiness Recovery and Continuity in a Mega Disaster (eBook, PDF)33,95 €
-
-
-
Privacy is not just the right to be left alone, but also the right to autonomy, control, and access to your personal data. This book aims at helping privacy leaders, professionals and organizations in establishing a unified, integrated, privacy program, both on a personal and enterprise-wide level.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 471
- Erscheinungstermin: 1. März 2023
- Englisch
- ISBN-13: 9781000840902
- Artikelnr.: 67037281
- Verlag: Taylor & Francis
- Seitenzahl: 471
- Erscheinungstermin: 1. März 2023
- Englisch
- ISBN-13: 9781000840902
- Artikelnr.: 67037281
Mr. Alan Tang has extensive experience devoted to privacy and security practices. Dr. Tang specializes in establishing and operationalizing risk-based and actionable privacy frameworks and programs in alignment with global privacy laws, regulations, and standards such as GDPR, CCPA/CPRA, PIPEDA, PIPL, LGPD, GAPP, ISO 27701, and NIST PF, etc. He believes in simplifying, automating, and scaling privacy controls to enable business growth.
Dr. Tang has firsthand experience in implementing an enterprise-wide, unified privacy framework and program for a Fortune 50 international company. The privacy framework has been implemented in 50+ countries through three phases. He has a strong history of working with business leaders in a wide range of privacy-related domains such as privacy strategy and roadmap, PIA and DPIA, privacy policies and procedures, privacy-by-design in SDLC, data subject rights assurance, data retention, data disclosure and sharing, data cross-border transfer, data security protection, privacy awareness training, data breach handling, etc.
Dr. Tang holds a Ph.D. degree in Information Security and an MBA degree. Alan also holds numerous privacy and security designations including FIP, CIPP/E, CIPP/US/C, CIPM, CIPT, CISSP, CISA, PMP, and previously ISO27001LA and PCI DSS QSA.
Dr. Tang has firsthand experience in implementing an enterprise-wide, unified privacy framework and program for a Fortune 50 international company. The privacy framework has been implemented in 50+ countries through three phases. He has a strong history of working with business leaders in a wide range of privacy-related domains such as privacy strategy and roadmap, PIA and DPIA, privacy policies and procedures, privacy-by-design in SDLC, data subject rights assurance, data retention, data disclosure and sharing, data cross-border transfer, data security protection, privacy awareness training, data breach handling, etc.
Dr. Tang holds a Ph.D. degree in Information Security and an MBA degree. Alan also holds numerous privacy and security designations including FIP, CIPP/E, CIPP/US/C, CIPM, CIPT, CISSP, CISA, PMP, and previously ISO27001LA and PCI DSS QSA.
Part 1: Privacy Basics and Landscape
1. Privacy Concept and a Brief History
2. Legal Systems
World Models
and Landscape
3. GDPR
CCPA/CPRA
PIPL and PIPEDA
4. Privacy Best Practices
Standards
and Certifications
Part 2: Business Impact and a Holistic Framework
5. Data Protection Drivers and Challenges
6. Unified Data Protection Framework
7. Privacy Program Assessment and Roadmap
8. Privacy Program Management Metrics and Tools
Part 3: Privacy Governance
9. Data Protection Legal Mandate and Business Requirements
10. Governance Structure and Responsibilities
11. Privacy Policies and Procedures
12. Privacy Awareness
Training
and Engagement
Part 4: Privacy Operations
13. Privacy Impact Assessment (PIA)
14. Record of Processing Activities
15. Privacy Notice
16. Lawful Basis
17. Data Collection
18. Data Usage and Maintenance
19. Personal Data Sharing
20. Data Residency and Cross-Border Transfers
21. Data Retention and De-Identification
22. Security of Personal Data Processing
Part 5: High-Risk Business Scenarios
23. PbD in Marketing Practices
24. Workforce Data Protection
25. Protection of Children's Data
26. PbD for AI Solutions
Part 6: Data Breach Handling and DPA Cooperation
27. Data Subject Rights
Inquiries
and Complaints
28. Data Breach Handling
29. DPA Cooperation
1. Privacy Concept and a Brief History
2. Legal Systems
World Models
and Landscape
3. GDPR
CCPA/CPRA
PIPL and PIPEDA
4. Privacy Best Practices
Standards
and Certifications
Part 2: Business Impact and a Holistic Framework
5. Data Protection Drivers and Challenges
6. Unified Data Protection Framework
7. Privacy Program Assessment and Roadmap
8. Privacy Program Management Metrics and Tools
Part 3: Privacy Governance
9. Data Protection Legal Mandate and Business Requirements
10. Governance Structure and Responsibilities
11. Privacy Policies and Procedures
12. Privacy Awareness
Training
and Engagement
Part 4: Privacy Operations
13. Privacy Impact Assessment (PIA)
14. Record of Processing Activities
15. Privacy Notice
16. Lawful Basis
17. Data Collection
18. Data Usage and Maintenance
19. Personal Data Sharing
20. Data Residency and Cross-Border Transfers
21. Data Retention and De-Identification
22. Security of Personal Data Processing
Part 5: High-Risk Business Scenarios
23. PbD in Marketing Practices
24. Workforce Data Protection
25. Protection of Children's Data
26. PbD for AI Solutions
Part 6: Data Breach Handling and DPA Cooperation
27. Data Subject Rights
Inquiries
and Complaints
28. Data Breach Handling
29. DPA Cooperation
Part 1: Privacy Basics and Landscape
1. Privacy Concept and a Brief History
2. Legal Systems
World Models
and Landscape
3. GDPR
CCPA/CPRA
PIPL and PIPEDA
4. Privacy Best Practices
Standards
and Certifications
Part 2: Business Impact and a Holistic Framework
5. Data Protection Drivers and Challenges
6. Unified Data Protection Framework
7. Privacy Program Assessment and Roadmap
8. Privacy Program Management Metrics and Tools
Part 3: Privacy Governance
9. Data Protection Legal Mandate and Business Requirements
10. Governance Structure and Responsibilities
11. Privacy Policies and Procedures
12. Privacy Awareness
Training
and Engagement
Part 4: Privacy Operations
13. Privacy Impact Assessment (PIA)
14. Record of Processing Activities
15. Privacy Notice
16. Lawful Basis
17. Data Collection
18. Data Usage and Maintenance
19. Personal Data Sharing
20. Data Residency and Cross-Border Transfers
21. Data Retention and De-Identification
22. Security of Personal Data Processing
Part 5: High-Risk Business Scenarios
23. PbD in Marketing Practices
24. Workforce Data Protection
25. Protection of Children's Data
26. PbD for AI Solutions
Part 6: Data Breach Handling and DPA Cooperation
27. Data Subject Rights
Inquiries
and Complaints
28. Data Breach Handling
29. DPA Cooperation
1. Privacy Concept and a Brief History
2. Legal Systems
World Models
and Landscape
3. GDPR
CCPA/CPRA
PIPL and PIPEDA
4. Privacy Best Practices
Standards
and Certifications
Part 2: Business Impact and a Holistic Framework
5. Data Protection Drivers and Challenges
6. Unified Data Protection Framework
7. Privacy Program Assessment and Roadmap
8. Privacy Program Management Metrics and Tools
Part 3: Privacy Governance
9. Data Protection Legal Mandate and Business Requirements
10. Governance Structure and Responsibilities
11. Privacy Policies and Procedures
12. Privacy Awareness
Training
and Engagement
Part 4: Privacy Operations
13. Privacy Impact Assessment (PIA)
14. Record of Processing Activities
15. Privacy Notice
16. Lawful Basis
17. Data Collection
18. Data Usage and Maintenance
19. Personal Data Sharing
20. Data Residency and Cross-Border Transfers
21. Data Retention and De-Identification
22. Security of Personal Data Processing
Part 5: High-Risk Business Scenarios
23. PbD in Marketing Practices
24. Workforce Data Protection
25. Protection of Children's Data
26. PbD for AI Solutions
Part 6: Data Breach Handling and DPA Cooperation
27. Data Subject Rights
Inquiries
and Complaints
28. Data Breach Handling
29. DPA Cooperation