There are a wide variety of books available on the topic of Data Protection, but selecting the one that is right for you and the users inside your organization can be a tough task. Solutions Review has taken the liberty of doing the research for you, having reviewed a multitude of these books. We’ve carefully selected the top books based on relevance, popularity, review ratings, publish date and ability to add business value.
Data Protection is an umbrella term used to describe a variety of data safeguarding techniques, tools and software features relating to backup, recovery, Business Continuity and governance. These protocols take aim at ensuring that vital business data remains properly stored, backed up and is in compliance with industry or governmental regulation.
Note: these titles are not industry specific; they should have applications in many verticals.
This book is for any manager or team leader that has the green light to implement a data governance program. The problem of managing data continues to grow with issues surrounding cost of storage, exponential growth, as well as administrative, management and security concerns – the solution to being able to scale all of these issues up is data governance which provides better services to users and saves money. What you will find in this book is an overview of why data governance is needed, how to design, initiate, and execute a program and how to keep the program sustainable. With the provided framework and case studies you will be enabled and educated in launching your very own successful and money saving data governance program.
Data privacy impacts many aspects of our interconnected life, but can present considerable challenges for anyone attempting to navigate the maze of laws, self-regulation, and best practices that apply to the field. Understanding Privacy and Data Protection provides a timely and succinct survey for understanding the trends that impact data privacy in the age of online behavioral advertising and social networks. Written by a lawyer specializing in data privacy and security matters, the book goes beyond the headlines to provide guidance about existing US and international laws and the technological developments that impact privacy. The author explores numerous topical issues and controversies, including the impact of US government surveillance on privacy, biometric identifiers, cloud computing, the Internet of things, big data, and privacy by design. The book also provides a guide to the current cybersecurity landscape, including the significant impact of unauthorized data breaches, such as hacking attacks, on businesses and individuals. This non-technical book also describes some of the practical steps that may be taken to protect privacy and security, as these fields continue to evolve.
The book explores core concepts, rights and values in (upcoming) data protection regulation and their (in)adequacy in view of developments such as Big and Open Data, including the right to be forgotten, metadata, and anonymity. It discusses privacy promoting methods and tools such as a formal systems modeling methodology, privacy by design in various forms (robotics, anonymous payment), the opportunities and burdens of privacy self management, the differentiating role privacy can play in innovation.
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to claims for compensation from affected individuals and financial penalties of up to £500,000 from the Information Commissioner’s Office, not to mention negative publicity and reputational damage. An expert introduction More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation’s use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.