LEADER 00850nam0-22002651i-450- 001 990007779480403321 035 $a000777948 035 $aFED01000777948 035 $a(Aleph)000777948FED01 035 $a000777948 100 $a20021010d--------km-y0itay50------ba 101 0 $aita 200 1 $a<>ATTUAZIONE in Italia delle direttive comunitarie$eLa legge 9 marzo, n. 86 con le modifiche apportate dalla legge 24aprile 1998, n. 128$fa cura di Gianfranco Amenta 210 $aTorino$cGiappichelli$d1998 215 $a222 p.$d24 cm 225 1 $aLegislazione/oggi 702 1$aAmenta,$bGianfranco 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007779480403321 952 $a3-F-131$b10848$fDDCP 959 $aDDCP 996 $aATTUAZIONE in Italia delle direttive comunitarie$9662499 997 $aUNINA DB $aGEN01 LEADER 06170nam 22009253u 450 001 9910141258503321 005 20240514073655.0 010 $a9786613703163 010 $a9781119204909 010 $a1119204909 010 $a9781280792779 010 $a1280792779 010 $a9781118286876 010 $a1118286871 035 $a(CKB)2670000000209125 035 $a(EBL)821999 035 $a(OCoLC)771652961 035 $a(SSID)ssj0000696660 035 $a(PQKBManifestationID)11416728 035 $a(PQKBTitleCode)TC0000696660 035 $a(PQKBWorkID)10681937 035 $a(PQKB)10893909 035 $a(MiAaPQ)EBC821999 035 $a(Perlego)1013505 035 $a(EXLCZ)992670000000209125 100 $a20130418d2012|||| u|| | 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSafeguarding Critical E-Documents $eImplementing a Program for Securing Confidential Information Assets 205 $a1st ed. 210 $aNew York $cWiley$d2012 215 $a1 online resource (285 p.) 300 $aDescription based upon print version of record. 311 08$a9781118282274 311 08$a1118282272 311 08$a9781118159088 311 08$a111815908X 327 $aSafeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes 327 $aCHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles 327 $aElectronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace 327 $aAre All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise 327 $aKey Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes 327 $aCHAPTER 8 Information Governance and Security for Cloud Computing Use 330 $aPractical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to ""information leakage"" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical 606 $aBUSINESS & ECONOMICS / Information Management 606 $aComputer security 606 $aComputer security 606 $aCyberspace - Security measures 606 $aCyberspace -- Security measures 606 $aDatabase security 606 $aElectronic records 606 $aComputer security$xSecurity measures 606 $aCyberspace 606 $aDatabase security 606 $aElectronic records 615 4$aBUSINESS & ECONOMICS / Information Management. 615 4$aComputer security. 615 4$aComputer security. 615 4$aCyberspace - Security measures. 615 4$aCyberspace -- Security measures. 615 4$aDatabase security. 615 4$aElectronic records. 615 0$aComputer security$xSecurity measures. 615 0$aCyberspace. 615 0$aDatabase security. 615 0$aElectronic records. 676 $a005.8 676 $a658.472 686 $aBUS083000$2bisacsh 700 $aSmallwood$b Robert F.$f1959-$0862457 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910141258503321 996 $aSafeguarding Critical E-Documents$91925180 997 $aUNINA