Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Dr Mike Brass (CISSP, CIPPE/E, CISM, CRISC)
See Mike's full review at: https://www.linkedin.com/pulse/review-privacy-practice-dr-mike-brass-cissp-cippe-e-cism-crisc--qfqie/?trackingId=CJypYojXzvq1GpauDJH13A%3D%3D
Privacy is a slippery term that people drag out for various reasons, some of which can be misleading. For instance, most American citizens believe that the Fourth Amendment guarantees their right to privacy and will cite it as such. Newsflash, it doesn't. The Fourth Amendment protects citizens from unreasonable search and seizure by the United States government. It does not guarantee that - for instance - your personal data won't be harvested and used for all sorts of nefarious purposes by shadowy entities in the data mining industry. Thus, for the sake of self-protection, if for no other reason, everybody in the digital age needs to know what privacy is, its implications, and its applications.
The problem arises from the fact that most of the concepts about privacy are rooted in the universe that existed prior to the commercial Internet. That world doesn't exist anymore, and it hasn't for some time. The other problem is simple ignorance. We don't understand the many vital nuances of privacy or what it means to us in terms of personal impacts. But, fear not... Alan Tang has covered the waterfront in "Privacy in Practice." This comprehensive guide doesn't simply discuss the general concept of privacy. It defines it from every possible cultural perspective and then proceeds to summarize its various incarnations in worldwide regulations and standards, leaving no stone unturned.
Then Tang gets serious about operationalizing the term. In effect, privacy has always been one of those lightweight concepts that everybody agrees is a good idea, but nobody has the slightest notion about how to substantively implement. The book provides a complete and highly credible, holistic architecture of standard real-world controls that can be handily tailored into a governance framework suitable to any general organizational application. The beauty of this book is that it provides nine chapters of explicit operational implementation advice, which ought to be sufficient to assure privacy in any organization of any size. Then, if you still aren't getting the picture, he provides case examples to illustrate how this can be done in various settings, as well as the practical operational steps to ensure it. So, when you finish this book, you will be as knowledgeable about privacy as any of the world's leading experts, which Tang just happens to be. Is that a coincidence? I think not.
- Dan Shoemaker, PhD - Distinguished Visitor of the Institute of Electrical and Electronics Engineers (IEEE) & Member of the Editorial Board, Computers and Security