Ad Image

Top Books on Data Protection for 2016

Books

There are a wide variety of books available on the topic of Data Protection, but selecting the one that is right for you and the users inside your organization can be a tough task. Solutions Review has taken the liberty of doing the research for you, having reviewed a multitude of these books. We’ve carefully selected the top books based on relevance, popularity, review ratings, publish date and ability to add business value.

Data Protection is an umbrella term used to describe a variety of data safeguarding techniques, tools and software features relating to backup, recovery, Business Continuity and governance. These protocols take aim at ensuring that vital business data remains properly stored, backed up and is in compliance with industry or governmental regulation.

Note: these titles are not industry specific; they should have applications in many verticals.

1. Data Governance: How to Design, Deploy and Sustain an Effective Data Governance Program by John Ladley, 2012

This book is for any manager or team leader that has the green light to implement a data governance program. The problem of managing data continues to grow with issues surrounding cost of storage, exponential growth, as well as administrative, management and security concerns – the solution to being able to scale all of these issues up is data governance which provides better services to users and saves money. What you will find in this book is an overview of why data governance is needed, how to design, initiate, and execute a program and how to keep the program sustainable. With the provided framework and case studies you will be enabled and educated in launching your very own successful and money saving data governance program.

2. Understanding Privacy and Data Protection: What You Need to Know by Timothy J. Toohey, 2014

Data privacy impacts many aspects of our interconnected life, but can present considerable challenges for anyone attempting to navigate the maze of laws, self-regulation, and best practices that apply to the field. Understanding Privacy and Data Protection provides a timely and succinct survey for understanding the trends that impact data privacy in the age of online behavioral advertising and social networks. Written by a lawyer specializing in data privacy and security matters, the book goes beyond the headlines to provide guidance about existing US and international laws and the technological developments that impact privacy. The author explores numerous topical issues and controversies, including the impact of US government surveillance on privacy, biometric identifiers, cloud computing, the Internet of things, big data, and privacy by design. The book also provides a guide to the current cybersecurity landscape, including the significant impact of unauthorized data breaches, such as hacking attacks, on businesses and individuals. This non-technical book also describes some of the practical steps that may be taken to protect privacy and security, as these fields continue to evolve.

3. Data Protection on the Move: Current Developments in ICT and Privacy/Data Protection (Law, Governance and Technology Series) by Serge Gutwirth, Ronald Leenes and Paul De Hert, 2016

The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation.

4. Data Protection and the Cloud: Are the risks too great? by Paul Ticher, 2015

Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to claims for compensation from affected individuals and financial penalties of up to £500,000 from the Information Commissioner’s Office, not to mention negative publicity and reputational damage. An expert introduction More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation’s use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.

5. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier, 2016

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.

Download link to Data Protection Vendor Map

Share This

Related Posts