Buy Building Effective Privacy Programs at Bookstore UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Privacy and data protection > Building Effective Privacy Programs: Cybersecurity from Principles to Practice
Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Building Effective Privacy Programs: Cybersecurity from Principles to Practice


     0     
5
4
3
2
1



Available


X
About the Book

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications Offers strategies to integrate privacy principles into business processes and IT systems Covers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actions Includes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

Table of Contents:
Preface xi Acknowledgement xiii 1 Introduction to Privacy 1 Definition and Importance of Privacy 1 Historical Perspective on Privacy 5 Modern Privacy Challenges 10 Recommendations 16 Chapter Conclusion 17 Questions 17 2 Understanding Personal Data 21 Definition and Types of Personal Data 21 Sensitive Personal Data 27 Data Combinations and Anonymization 32 Recommendations 37 Chapter Conclusion 38 Questions 38 3 Data Processing 41 Definition and Types of Processing 42 Legal Bases for Processing 48 Data Processing Principles 54 Recommendations 60 Chapter Conclusion 60 Questions 61 4 Roles and Relationships 65 Data Controller vs. Data Processor 65 Subprocessors 75 Data Subjects and Their Rights 80 Recommendations 84 Chapter Conclusion 85 Questions 86 5 Privacy Impact Assessments 89 Purpose and Benefits of PIA 89 Conducting a PIA 94 Example of PIA 96 PIA Templates and Examples 101 Recommendations 107 Chapter Conclusion 108 Questions 109 6 Roles in Privacy Leadership 113 Chief Privacy Officer 113 Chief Information Security Officer 116 Data Protection Officer 118 Privacy Champions 121 Privacy Engineers 123 Recommendations 127 Chapter Conclusion 129 Questions 129 7 Data Subject Rights 133 Foundational Frameworks 133 Handling Data Subject Requests 140 DSR Tools and Techniques 145 Recommendations 151 Chapter Conclusion 152 Questions 152 8 Privacy Frameworks and Standards 157 NIST Privacy Framework: Mapping Organizational Practices to the Framework 157 Iso/iec 27701 160 Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD 166 Recommendations 172 Chapter Conclusion 173 Questions 174 9 Major Privacy Laws and Regulations 177 Laws and Regulations 177 California Consumer Privacy Act 185 Health Insurance Portability and Accountability Act 190 Comparative Analysis of Global Regulations 198 Recommendations 200 Chapter Conclusion 201 Questions 202 10 International Privacy Concerns 205 Cross-Border Data Transfers 205 Adequacy Decisions 213 BCRs and SCCs 218 Recommendations 223 Chapter Conclusion 224 Questions 225 11 Regulatory Enforcement 229 Role of DPAs 229 Case Studies of Regulatory Actions 240 Recommendations 244 Chapter Conclusion 246 Questions 246 12 Privacy by Design and Default 251 Principles of Privacy by Design 251 Implementing Privacy by Default 255 Case Studies and Best Practices 258 Recommendations 262 Chapter Conclusion 263 Questions 263 13 Privacy Technology and Tools 267 PETs: Anonymization vs. Pseudonymization 267 Data Masking and Encryption 270 Privacy Management Software 275 Recommendations 278 Chapter Conclusion 280 Questions 280 14 Data Breach Management 283 Identifying and Responding to Data Breaches 283 Notification Requirements 288 Postbreach Remediation 292 Recommendations 296 Chapter Conclusion 298 Questions 298 15 Emerging Privacy Trends 301 AI and Privacy 301 IoT and Privacy 305 Blockchain and Privacy 310 Recommendations 315 Chapter Conclusion 316 Questions 317 16 Privacy Program Implementation 321 Establishing a Privacy Governance Structure 321 Developing Privacy Policies and Procedures 326 Implementing Privacy Controls and Measures 333 Monitoring and Reporting on Privacy Compliance 339 Continuous Improvement of the Privacy Program 346 Recommendations 354 Chapter Conclusion 355 Questions 356 17 Privacy Training and Awareness 359 Developing Effective Privacy Training Programs 359 Engaging Employees in Privacy Awareness 364 Training Tools and Resources 368 Sample Annual Privacy Training Plan 369 Recommendations 372 Chapter Conclusion 373 Questions 373 18 Privacy Audits and Assessments 377 Essential Program Components 377 Using Assessment Tools 382 Integrating Assessments with Risk Management 385 Reporting and Follow-Up Actions 387 Recommendations 389 Chapter Conclusion 390 Questions 390 Answers 395 Index 421

About the Author :
Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn. Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights.


Best Sellers


Product Details
  • ISBN-13: 9781394342631
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 282 mm
  • No of Pages: 448
  • Returnable: N
  • Returnable: N
  • Sub Title: Cybersecurity from Principles to Practice
  • Width: 223 mm
  • ISBN-10: 1394342632
  • Publisher Date: 02 Oct 2025
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Returnable: N
  • Spine Width: 32 mm
  • Weight: 368 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Building Effective Privacy Programs: Cybersecurity from Principles to Practice
John Wiley & Sons Inc -
Building Effective Privacy Programs: Cybersecurity from Principles to Practice
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!