Wildy logo
(020) 7242 5778
enquiries@wildy.com

Wildy’s Book News

Book News cover photo

Vol 21 No 11 Nov/Dec 2016

Book of the Month

Cover of Criminal Injuries Compensation Claims

Criminal Injuries Compensation Claims

Price: £99.95

Pupillage & Student Offers

Special Discounts for Pupils, Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Managing Legal and Security Risks in Computers and Communications

Image not available lge

ISBN13: 9780750699389
ISBN: 0750699388
Published: February 1998
Publisher: Butterworth-Heinemann
Country of Publication: UK
Format: Paperback
Price: £36.99



This is a Print On Demand Title.
The publisher will print a copy to fulfill your order. Books can take between 1 to 3 weeks. Looseleaf titles between 1 to 2 weeks.

The protection of computer and telecommunications technologies has spawned a completely new set of legal risks. Liability and litigation can arise from many situations, including misuse and abuse of computer databases, bulletin boards, e-mail, Web pages, electronic funds transfer systems, and proprietary computer programs. Managing Legal and Security Risks in Computing and Communications is written for professionals who are responsible for the protection of these systems. This up-to-date, easy-to-read guide to computer-related crime examines legal liability risks and recommends practical ways companies can develop policies, codes of conduct, and communications designed to make employees aware of their compliance obligations. Managing Legal and Security Risks in Computing and Communications will: * help you quickly locate pertinent laws * provide guidance on the laws * present a legal reference for developing training material * help you foster a continuing dialog with legal counsel

Image not available lge
Contents:
Computer Protection and Legal Liability Risks
Reducing Liability Risks: Compliance Programs
Protecting Intellectual Property Rights
Trade Secrets
Trademarks and Patents
Copyrights
Information Privacy and Confidentiality
Records Management
Disaster Planning for Information Systems
Electronic Commerce
E-mail Policy Guide
Creating and Managing a Website
Computer Crime Law
Federal Sentencing Guidelines for Individuals and Organizations
Shoehorn Laws: Federal Statutes Used to Prosecute Computer-related Crime
State Computer Crime Statutes
Discovery and Computer Evidence
Technical Standards for Computing and Communications Security.