Text
Net privacy: a guide to developing & implementing an ironclad ebusiness privacy plan
DAFTAR ISI:
1. The threat to privacy and corporate vulnerability
2. The nature or privacy problems
3. The regulatory and legislative environment
4. Organizing to protect privacy
5. Conducting a privacy-needs audit
6. Evaluating technology needs for privacy protection
7. Developing the enterprise privacy plan
8. Implementing the enterprise privacy plan
9. Managing privacy on the enterprise web site
10. Managing privacy on internet suplly chains
11. Managing privacy efforts over the long-term
12. Protecting the privacy of enterprise storage and processing
13. Protecting the privacy of corporate communications
14. Protecting corporate desktop privacy
15. Protecting the privacy of the road warrior
No other version available