top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Agile Foundations [[electronic resource] ] : Principles, practices and frameworks
Agile Foundations [[electronic resource] ] : Principles, practices and frameworks
Autore Measey Peter
Edizione [1st edition]
Pubbl/distr/stampa Swindon, : BCS Learning & Development Limited, 2015
Descrizione fisica 1 online resource (199 p.)
Disciplina 005.1
Altri autori (Persone) BerridgeChris
GrayAlex
WolfLazaro
MeaseyPeter
OliverLes
RobertsBarbara
ShortMichael
WilmshurstDarren
Soggetto topico Agile software development
Computer science
User interfaces (Computer systems)
Engineering & Applied Sciences
Computer Science
Soggetto genere / forma Electronic books.
ISBN 1-68015-721-3
1-78017-255-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Copyright; CONTENTS; LIST OF FIGURES AND TABLES; CONTRIBUTORS; SECTION REVIEWERS; GLOSSARY; PREFACE; INTRODUCTION; PART 1 INTRODUCING AGILE; 1. WHAT IS AGILE?; 1.1 THE HISTORY OF AGILE; 1.2 THE AGILE MANIFESTO; 2. THE FOUNDATIONS OF AGILE; 2.1 THE AGILE MINDSET; 2.2 DELIVERY ENVIRONMENTS AND AGILE SUITABILITY; 2.3 THE LIFECYCLE OF PRODUCT DEVELOPMENT; 2.4 THE 'IRON TRIANGLE'; 2.5 WORKING WITH UNCERTAINTY AND VOLATILITY; 2.6 EMPIRICAL AND DEFINED PROCESSES; 3. AGILE AND THE BUSINESS; 3.1 THE ECONOMIC CASE FOR AGILE; 3.2 BUSINESS CULTURE AND AGILE; 4. AGILE MYTHS
PART 2 A GENERIC AGILE FRAMEWORK5. GENERIC AGILE PROCESS; 5.1 AGILE OPERATING MODEL; 6. COMMON AGILE ROLES; 6.1 THE CUSTOMER; 6.2 THE TEAM; 6.3 THE AGILE LEAD; 6.4 THE STAKEHOLDERS; 7. COMMON AGILE TECHNIQUES; 7.1 STORIES AND BACKLOG REFINEMENT; 7.2 AGILE ESTIMATION; 7.3 AGILE PLANNING; 7.4 AGILE TESTING; 8. COMMON AGILE PRACTICES; 8.1 SHORT FEEDBACK LOOPS; 8.2 FACE-TO-FACE COMMUNICATION; 8.3 DAILY STAND-UPS; 8.4 SHOW AND TELLS; 8.5 RETROSPECTIVES; 8.6 EMERGENT DOCUMENTATION; 8.7 VISUAL BOARDS; 8.8 SUSTAINABLE PACE; 8.9 FOCUS ON QUALITY; 8.10 MAJOR AGILE TECHNICAL PRACTICES
PART 3 APPLYING AGILE PRINCIPLES9. INDIVIDUALS AND INTERACTIONS OVER PROCESSES AND TOOLS; 9.1 MOTIVATED AND TALENTED INDIVIDUALS; 9.2 EMERGENT DESIGN FROM SELF-ORGANISING TEAMS; 9.3 TEAM DYNAMICS; 10. WORKING SOFTWARE OVER COMPREHENSIVE DOCUMENTATION; 10.1 SATISFY THE CUSTOMER AND CONTINUOUS DELIVERY OF VALUE; 10.2 DELIVER WORKING SOFTWARE FREQUENTLY; 10.3 WORKING SOFTWARE AS A MEASURE OF PROGRESS; 10.4 TECHNICAL EXCELLENCE AND GOOD DESIGN; 11. CUSTOMER COLLABORATION OVER CONTRACT NEGOTIATIONS; 11.1 BUSINESS PEOPLE AND DEVELOPERS MUST WORK TOGETHER
11.2 REFLECT AND ADJUST (INSPECT AND ADAPT) REGULARLY12. RESPONDING TO CHANGE OVER FOLLOWING A PLAN; 12.1 EMBRACE CHANGE; 13. SIMPLICITY; 13.1 FIT-FOR-PURPOSE PRODUCTS; 13.2 FIT-FOR-PURPOSE DELIVERY; PART 4 AGILE FRAMEWORKS; 14. MAJOR AGILE FRAMEWORKS; 14.1 EXTREME PROGRAMMING (XP); 14.2 SCRUM; 14.3 DSDM; 14.4 AGILE PROJECT MANAGEMENT; 14.5 KANBAN; 14.6 LEAN SOFTWARE DEVELOPMENT; 14.7 LEAN START-UP; 14.8 SCALED AGILE FRAMEWORK (SAFE); REFERENCES; RECOMMENDED FURTHER READING OR 'WHAT'S ON OUR OFFICE BOOKSHELF'; INDEX; Back Cover
Record Nr. UNINA-9910460161603321
Measey Peter  
Swindon, : BCS Learning & Development Limited, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Agile Foundations : Principles, practices and frameworks
Agile Foundations : Principles, practices and frameworks
Autore Measey Peter
Edizione [1st edition]
Pubbl/distr/stampa Swindon, : BCS Learning & Development Limited, 2015
Descrizione fisica 1 online resource (199 p.)
Disciplina 005.1
Altri autori (Persone) BerridgeChris
GrayAlex
WolfLazaro
MeaseyPeter
OliverLes
RobertsBarbara
ShortMichael
WilmshurstDarren
Soggetto topico Agile software development
Computer science
User interfaces (Computer systems)
Engineering & Applied Sciences
Computer Science
ISBN 1-68015-721-3
1-78017-255-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Copyright; CONTENTS; LIST OF FIGURES AND TABLES; CONTRIBUTORS; SECTION REVIEWERS; GLOSSARY; PREFACE; INTRODUCTION; PART 1 INTRODUCING AGILE; 1. WHAT IS AGILE?; 1.1 THE HISTORY OF AGILE; 1.2 THE AGILE MANIFESTO; 2. THE FOUNDATIONS OF AGILE; 2.1 THE AGILE MINDSET; 2.2 DELIVERY ENVIRONMENTS AND AGILE SUITABILITY; 2.3 THE LIFECYCLE OF PRODUCT DEVELOPMENT; 2.4 THE 'IRON TRIANGLE'; 2.5 WORKING WITH UNCERTAINTY AND VOLATILITY; 2.6 EMPIRICAL AND DEFINED PROCESSES; 3. AGILE AND THE BUSINESS; 3.1 THE ECONOMIC CASE FOR AGILE; 3.2 BUSINESS CULTURE AND AGILE; 4. AGILE MYTHS
PART 2 A GENERIC AGILE FRAMEWORK5. GENERIC AGILE PROCESS; 5.1 AGILE OPERATING MODEL; 6. COMMON AGILE ROLES; 6.1 THE CUSTOMER; 6.2 THE TEAM; 6.3 THE AGILE LEAD; 6.4 THE STAKEHOLDERS; 7. COMMON AGILE TECHNIQUES; 7.1 STORIES AND BACKLOG REFINEMENT; 7.2 AGILE ESTIMATION; 7.3 AGILE PLANNING; 7.4 AGILE TESTING; 8. COMMON AGILE PRACTICES; 8.1 SHORT FEEDBACK LOOPS; 8.2 FACE-TO-FACE COMMUNICATION; 8.3 DAILY STAND-UPS; 8.4 SHOW AND TELLS; 8.5 RETROSPECTIVES; 8.6 EMERGENT DOCUMENTATION; 8.7 VISUAL BOARDS; 8.8 SUSTAINABLE PACE; 8.9 FOCUS ON QUALITY; 8.10 MAJOR AGILE TECHNICAL PRACTICES
PART 3 APPLYING AGILE PRINCIPLES9. INDIVIDUALS AND INTERACTIONS OVER PROCESSES AND TOOLS; 9.1 MOTIVATED AND TALENTED INDIVIDUALS; 9.2 EMERGENT DESIGN FROM SELF-ORGANISING TEAMS; 9.3 TEAM DYNAMICS; 10. WORKING SOFTWARE OVER COMPREHENSIVE DOCUMENTATION; 10.1 SATISFY THE CUSTOMER AND CONTINUOUS DELIVERY OF VALUE; 10.2 DELIVER WORKING SOFTWARE FREQUENTLY; 10.3 WORKING SOFTWARE AS A MEASURE OF PROGRESS; 10.4 TECHNICAL EXCELLENCE AND GOOD DESIGN; 11. CUSTOMER COLLABORATION OVER CONTRACT NEGOTIATIONS; 11.1 BUSINESS PEOPLE AND DEVELOPERS MUST WORK TOGETHER
11.2 REFLECT AND ADJUST (INSPECT AND ADAPT) REGULARLY12. RESPONDING TO CHANGE OVER FOLLOWING A PLAN; 12.1 EMBRACE CHANGE; 13. SIMPLICITY; 13.1 FIT-FOR-PURPOSE PRODUCTS; 13.2 FIT-FOR-PURPOSE DELIVERY; PART 4 AGILE FRAMEWORKS; 14. MAJOR AGILE FRAMEWORKS; 14.1 EXTREME PROGRAMMING (XP); 14.2 SCRUM; 14.3 DSDM; 14.4 AGILE PROJECT MANAGEMENT; 14.5 KANBAN; 14.6 LEAN SOFTWARE DEVELOPMENT; 14.7 LEAN START-UP; 14.8 SCALED AGILE FRAMEWORK (SAFE); REFERENCES; RECOMMENDED FURTHER READING OR 'WHAT'S ON OUR OFFICE BOOKSHELF'; INDEX; Back Cover
Record Nr. UNINA-9911006889003321
Measey Peter  
Swindon, : BCS Learning & Development Limited, 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The autonomous enterprise : powered by AI / / Sarah Burnett
The autonomous enterprise : powered by AI / / Sarah Burnett
Autore Burnett Sarah
Pubbl/distr/stampa England : , : BCS Learning & Development Limited, , [2022]
Descrizione fisica 1 online resource (221 pages)
Disciplina 658.0563
Soggetto topico Artificial intelligence
ISBN 1-78017-584-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Half-Title Page -- Bcs, The Chartered Institute For It -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Author -- Foreword by Professor Leslie Willcocks -- Acknowledgements -- Abbreviations -- Glossary -- Useful websites -- Preface -- PART 1: THE RISE OF THE AUTONOMOUS ENTERPRISE -- 1. INTRODUCTION AND OVERVIEW -- What is the autonomous enterprise and why we need to learn about it? -- The birth of the autonomous enterprise -- AI for innovation -- AI for efficiency -- Going from digital to phygital -- AI adoption -- Summary -- 2. WHAT YOU NEED TO KNOW ABOUT AI -- The evolution of AI and why it is rapidly advancing now -- Breaking it down: Making AI work for you -- Summary -- 3. AI FOR INNOVATION -- Applying AI to innovation in your business -- AI and creativity -- The AI fountain -- Summary -- 4. AI FOR EFFICIENCY -- Bringing AI for efficiency to life -- What is intelligent automation? -- The role of IA in business efficiency -- IA technologies -- Summary -- PART 2: CASE STUDIES -- 5. THE BIONIC CUSTOMER SERVICE AGENT AT SIEMENS GLOBAL BUSINESS SERVICES -- About Siemens Global Business Services -- The business context -- The bionic agent for service ticket processing -- Summary -- 6. RETAINING THE HUMAN TOUCH AT CALDERDALE COUNCIL -- Background -- About Calderdale Council -- The business context -- Introducing VIRA -- Summary -- 7. AI IMPROVING STROKE CARE AT THE ROYAL BERKSHIRE NHS FOUNDATION TRUST -- About RBFT -- The healthcare context -- Under the hood of the technology -- Summary -- 8. AI IN SALES OPTIMISATION AT WÄRTSILÄ -- About Wärtsilä -- The business context -- The sales optimisation solution -- Summary -- PART 3: THE SHAPE OF THINGS TO COME - THE AUTONOMOUS ENTERPRISE -- 9. THE AUTONOMOUS ENTERPRISE -- The start of the journey -- Autonomous enterprise definition.
Turning knowledge processes inside out -- The autonomous enterprise mindset -- The ongoing autonomous enterprise journey -- How things can go wrong -- Summary -- 10. AUTOMATION AND SOCIETY -- Jobs for humans -- Creation of new roles -- AI ethics -- Ethical technology -- AI for good -- Summary -- Afterword -- References -- Further reading -- Index.
Record Nr. UNINA-9910795675903321
Burnett Sarah  
England : , : BCS Learning & Development Limited, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The autonomous enterprise : powered by AI / / Sarah Burnett
The autonomous enterprise : powered by AI / / Sarah Burnett
Autore Burnett Sarah
Pubbl/distr/stampa England : , : BCS Learning & Development Limited, , [2022]
Descrizione fisica 1 online resource (221 pages)
Disciplina 658.0563
Soggetto topico Artificial intelligence
ISBN 1-78017-584-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Half-Title Page -- Bcs, The Chartered Institute For It -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Author -- Foreword by Professor Leslie Willcocks -- Acknowledgements -- Abbreviations -- Glossary -- Useful websites -- Preface -- PART 1: THE RISE OF THE AUTONOMOUS ENTERPRISE -- 1. INTRODUCTION AND OVERVIEW -- What is the autonomous enterprise and why we need to learn about it? -- The birth of the autonomous enterprise -- AI for innovation -- AI for efficiency -- Going from digital to phygital -- AI adoption -- Summary -- 2. WHAT YOU NEED TO KNOW ABOUT AI -- The evolution of AI and why it is rapidly advancing now -- Breaking it down: Making AI work for you -- Summary -- 3. AI FOR INNOVATION -- Applying AI to innovation in your business -- AI and creativity -- The AI fountain -- Summary -- 4. AI FOR EFFICIENCY -- Bringing AI for efficiency to life -- What is intelligent automation? -- The role of IA in business efficiency -- IA technologies -- Summary -- PART 2: CASE STUDIES -- 5. THE BIONIC CUSTOMER SERVICE AGENT AT SIEMENS GLOBAL BUSINESS SERVICES -- About Siemens Global Business Services -- The business context -- The bionic agent for service ticket processing -- Summary -- 6. RETAINING THE HUMAN TOUCH AT CALDERDALE COUNCIL -- Background -- About Calderdale Council -- The business context -- Introducing VIRA -- Summary -- 7. AI IMPROVING STROKE CARE AT THE ROYAL BERKSHIRE NHS FOUNDATION TRUST -- About RBFT -- The healthcare context -- Under the hood of the technology -- Summary -- 8. AI IN SALES OPTIMISATION AT WÄRTSILÄ -- About Wärtsilä -- The business context -- The sales optimisation solution -- Summary -- PART 3: THE SHAPE OF THINGS TO COME - THE AUTONOMOUS ENTERPRISE -- 9. THE AUTONOMOUS ENTERPRISE -- The start of the journey -- Autonomous enterprise definition.
Turning knowledge processes inside out -- The autonomous enterprise mindset -- The ongoing autonomous enterprise journey -- How things can go wrong -- Summary -- 10. AUTOMATION AND SOCIETY -- Jobs for humans -- Creation of new roles -- AI ethics -- Ethical technology -- AI for good -- Summary -- Afterword -- References -- Further reading -- Index.
Record Nr. UNINA-9910823984403321
Burnett Sarah  
England : , : BCS Learning & Development Limited, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business analysis / / Debra Paul and James Cadle
Business analysis / / Debra Paul and James Cadle
Autore Paul Debra
Edizione [Fourth edition.]
Pubbl/distr/stampa Swindon, United Kingdom : , : BCS Learning & Development Limited, , 2020
Descrizione fisica 1 online resource (439 pages) : illustrations
Disciplina 658.4012
Soggetto topico Business analysts
Business planning
Organizational effectiveness
ISBN 9781523148295
1523148292
9781780175126
1780175124
9781780175119
1780175116
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9911007384503321
Paul Debra  
Swindon, United Kingdom : , : BCS Learning & Development Limited, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data protection and compliance / / Stewart Room
Data protection and compliance / / Stewart Room
Autore Room Stewart
Edizione [2nd ed.]
Pubbl/distr/stampa Swindon : , : BCS Learning & Development Limited, , 2021
Descrizione fisica 1 online resource (543 pages) : illustrations
Disciplina 342.4
Altri autori (Persone) RoomStewart
Maher
O'BrienNiall
PanagiotopoulosAdam
NahidShervin
HallRichard
ThuraisingamTughan
Drury-SmithJames
DavisSimon
Soggetto topico Data protection - Law and legislation - Great Britain
Privacy, Right of - Great Britain
Records - Law and legislation - Great Britain
ISBN 1-78017-526-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Half-Title Page -- BCS, THE CHARTERED INSTITUTE FOR IT -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Contributors -- Copyright notices -- Abbreviations -- Preface -- PART I THE BIG PICTURE -- 1. INTRODUCTION TO DATA PROTECTION -- What is data protection? -- Does data protection mean privacy? -- What is privacy? -- Are there exceptions to the right to privacy? -- What else should be protected? -- Protecting fundamental rights and freedoms ('human rights') -- Protecting the free movement of personal data (data flows, transfers and shares) -- The protected activities -- Protecting processing -- Protecting personal data undergoing processing -- Special category data (or 'sensitive personal data') -- Thematic priorities of data protection, trends and hot topics - supporting a risk-based approach -- AdTech and cookies -- Advanced technology and data processing techniques -- Advanced surveillance -- Artificial intelligence -- Automated facial recognition -- Connected vehicles -- Children -- Cybersecurity -- Data subject rights - timetable breaches -- Democracy -- HR problems -- International transfers -- Privacy and electronic communications ('ePrivacy') -- Profiling -- Virtual voice assistants -- Core law -- The UK Data Protection Act and its relationship to the GDPR and other EU law -- The Data Protection Convention -- Regulatory guidance and decisions -- Court judgments -- Related law -- Data protection penalties and litigation -- The regulatory bear market -- Summary -- 2. INTRODUCTION TO THE GDPR -- Brexit: the impacts for data protection and the impacts for this book -- The land mass in Europe to which the GDPR applies -- Recitals and articles of the GDPR -- Jurisdiction of the GDPR -- Nationality and location of people -- A.3.1 - processing in the context of EU establishments.
A.3.2 - targeting people in the EU -- Material scope of the GDPR -- The building blocks of the GDPR -- The actors -- Compliance framework - the standards of protection -- Data protection principles -- Lawful bases of processing -- Necessity -- Consent for processing -- Compliance framework - controls -- Appropriate technical and organisational measures -- Appropriate safeguards -- Prescribed controls -- Anonymisation and pseudonymisation -- Accountability -- Assessing appropriateness of controls -- Critical outcomes to be achieved -- Transparency -- Clarity of the lawful basis of processing -- Control -- Compensatory mechanisms to remedy non-compliance -- Regulator's enforcement powers -- Data subjects' enforcement powers -- Where the GDPR does not apply - exceptions and restrictions -- Domestic processing -- Restrictions and the UK DPA -- Brexit - the UK, Frozen and EU GDPR -- UK GDPR -- Frozen GDPR -- Brexit - international transfers of data -- Summary -- 3. INTRODUCTION TO EPRIVACY -- Regulating the electronic communications sector -- The relationship between data protection and ePrivacy -- The actors and protected parties -- Confidentiality of communications -- Exceptions to confidentiality -- Consent for storing or accessing information in terminal equipment -- Consent, transparency and the use of cookie notices and consent tools -- Types of cookies -- Cookies, behavioural advertising and real-time bidding -- Cookies and legal risk -- Direct marketing -- The position under PECR -- Postal direct marketing -- Opt-out, as a matter of law -- Financial penalties for direct marketing contraventions -- Processing of traffic data, location data and value added services -- Security and personal data breach notification -- Personal data breaches -- Expanded rules for breach notifications -- Interplay with the breach notification rules in the GDPR.
Calling line ID and directories of subscribers -- Law reform underway -- Summary -- 4. INTRODUCTION TO OPERATIONAL DATA PROTECTION -- Operational adequacy schemes - implementing data protection (operationalisation) -- Focus on operational adequacy schemes -- The three layers of an organisation -- Implementing data protection in the people layer -- Governance structures -- Steering committee -- Recruitment and onboarding -- Education and training -- Access rights and privileges -- Monitoring -- Worker discipline -- Flowing requirements to data processors -- Implementing data protection in the paper layer -- Data Protection by Design and Default (DPbDD, or PbD) -- Governance structures -- Records of processing activities -- Risk registers and assessment tools and methodologies -- Legitimate interests assessments -- Transfer assessments -- Transparency notices -- Contracts and similar documents -- Policies, procedures and controls frameworks -- Records of significant events -- Programme and project plans -- Technology architecture -- Assurance records -- Other mechanisms for assurance -- Implementing data protection in the technology and data layer -- Privacy Enhancing Technologies -- Regulatory sandboxes -- 'The Journey to Code' -- Risk management - implementing measures to assess risks to rights and freedoms and the appropriateness of controls -- The adequacy test -- The impact of the 'consensus of professional opinion' - what are the risks and what should be done about them? -- Risk management - dealing with adverse scrutiny -- Globalisation - implementing data protection on an international stage -- International transfers - adequacy, appropriate safeguards and derogations -- Meaning of 'adequacy' for the purposes of international transfers -- Adequacy of the UK -- Appropriate safeguards -- Derogations.
Wider operational challenges of international activities -- Impacts for micro, small and medium-sized enterprises -- Size of enterprise and size of risk -- Financial resources, cost and risk -- Security and connection to wider legal and operational frameworks -- Summary -- PART II CORE LAW -- 5. THE PRINCIPLES OF DATA PROTECTION -- A constant presence in data protection law -- The duty of compliance (accountability) -- Lawfulness, fairness and transparency - the first principle -- Lawfulness -- Fairness -- Transparency -- Purpose limitation - the second principle -- Expanded purposes - archiving in the public interest -- Expanded purposes - scientific and historical research -- Expanded purposes - statistics -- Compatibility -- Data minimisation - the third principle -- Accuracy - the fourth principle -- Storage limitation - the fifth principle -- Integrity and confidentiality (including security) - the sixth principle -- Accountability - the seventh principle -- Lawfulness of processing of personal data (Article 6) -- Categorising the lawful bases of processing -- Consent -- Contract -- Legal obligation -- Vital interests -- Public task -- Legitimate interests -- Lawfulness of processing - special category personal data and criminal convictions and offences -- The ban on processing special category personal data - enhanced sensitivity, risks and legal requirement -- Summary -- 6. THE RIGHTS OF DATA SUBJECTS -- Informing and empowering the protected party -- Transparency and information rights -- General obligation of transparency - GDPR A. -- Obtaining transparency - GDPR A.13 and -- The right of access to information - A. -- Personal data breaches - Article -- Rights over data processing -- Right to rectification - A. -- Right to erasure, or 'the right to be forgotten' - A. -- Right to restriction of processing - A.
Right to data portability - A. -- Right to object - A. -- Right not to be subject to automated decision making, including profiling - A. -- Remedies and rights of redress -- Summary -- PART III OPERATING INTERNATIONALLY -- 7. NATIONAL SUPERVISION WITHIN AN INTERNATIONAL FRAMEWORK -- National regulatory systems and divergences -- GDPR solution for international processing -- Establishment of supervisory authorities -- General conditions for members of supervisory authorities -- Independence -- Interference -- Supervisory authority competence -- Member competence -- Tasks -- Monitoring -- Promotion and awareness -- Advice and administration -- Rights, complaints and enforcement -- Powers -- Lead supervisory authorities -- Cross-border processing -- Cooperation and mutual assistance -- Choosing a lead supervisory authority -- Appointing an EU Representative -- Summary -- 8. TRANSFERRING DATA BETWEEN THE GDPR LAND MASS AND THIRD COUNTRIES -- Why regulate international transfers? -- What is a transfer? -- General principles for transfers -- Transfers on the basis of an adequacy decision -- Elements considered in assessing adequacy -- Adequacy decisions issued -- UK adequacy -- Partial adequacy decisions -- Ongoing monitoring of adequacy decisions -- Transfers subject to appropriate safeguards -- Standard contractual clauses -- Derogations for specific situations -- Relying on the derogations in practice -- Compelling legitimate interests -- Litigation on international data transfers -- Schrems I - Safe Harbor decision declared invalid -- Schrems II - Privacy Shield declared invalid and SCCs declared valid subject to certain conditions -- Navigating international data transfers -- EDPB's six-step recommendations -- Supplementary measures -- A practical approach to international transfers -- Getting to know your 'special characteristics' -- Understanding the 'zone of precedent'.
Record Nr. UNINA-9910795328403321
Room Stewart  
Swindon : , : BCS Learning & Development Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data protection and compliance / / Stewart Room
Data protection and compliance / / Stewart Room
Autore Room Stewart
Edizione [2nd ed.]
Pubbl/distr/stampa Swindon : , : BCS Learning & Development Limited, , 2021
Descrizione fisica 1 online resource (543 pages) : illustrations
Disciplina 342.4
Altri autori (Persone) RoomStewart
Maher
O'BrienNiall
PanagiotopoulosAdam
NahidShervin
HallRichard
ThuraisingamTughan
Drury-SmithJames
DavisSimon
Soggetto topico Data protection - Law and legislation - Great Britain
ISBN 9781780175263
1780175264
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover -- Half-Title Page -- BCS, THE CHARTERED INSTITUTE FOR IT -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Contributors -- Copyright notices -- Abbreviations -- Preface -- PART I THE BIG PICTURE -- 1. INTRODUCTION TO DATA PROTECTION -- What is data protection? -- Does data protection mean privacy? -- What is privacy? -- Are there exceptions to the right to privacy? -- What else should be protected? -- Protecting fundamental rights and freedoms ('human rights') -- Protecting the free movement of personal data (data flows, transfers and shares) -- The protected activities -- Protecting processing -- Protecting personal data undergoing processing -- Special category data (or 'sensitive personal data') -- Thematic priorities of data protection, trends and hot topics - supporting a risk-based approach -- AdTech and cookies -- Advanced technology and data processing techniques -- Advanced surveillance -- Artificial intelligence -- Automated facial recognition -- Connected vehicles -- Children -- Cybersecurity -- Data subject rights - timetable breaches -- Democracy -- HR problems -- International transfers -- Privacy and electronic communications ('ePrivacy') -- Profiling -- Virtual voice assistants -- Core law -- The UK Data Protection Act and its relationship to the GDPR and other EU law -- The Data Protection Convention -- Regulatory guidance and decisions -- Court judgments -- Related law -- Data protection penalties and litigation -- The regulatory bear market -- Summary -- 2. INTRODUCTION TO THE GDPR -- Brexit: the impacts for data protection and the impacts for this book -- The land mass in Europe to which the GDPR applies -- Recitals and articles of the GDPR -- Jurisdiction of the GDPR -- Nationality and location of people -- A.3.1 - processing in the context of EU establishments.
A.3.2 - targeting people in the EU -- Material scope of the GDPR -- The building blocks of the GDPR -- The actors -- Compliance framework - the standards of protection -- Data protection principles -- Lawful bases of processing -- Necessity -- Consent for processing -- Compliance framework - controls -- Appropriate technical and organisational measures -- Appropriate safeguards -- Prescribed controls -- Anonymisation and pseudonymisation -- Accountability -- Assessing appropriateness of controls -- Critical outcomes to be achieved -- Transparency -- Clarity of the lawful basis of processing -- Control -- Compensatory mechanisms to remedy non-compliance -- Regulator's enforcement powers -- Data subjects' enforcement powers -- Where the GDPR does not apply - exceptions and restrictions -- Domestic processing -- Restrictions and the UK DPA -- Brexit - the UK, Frozen and EU GDPR -- UK GDPR -- Frozen GDPR -- Brexit - international transfers of data -- Summary -- 3. INTRODUCTION TO EPRIVACY -- Regulating the electronic communications sector -- The relationship between data protection and ePrivacy -- The actors and protected parties -- Confidentiality of communications -- Exceptions to confidentiality -- Consent for storing or accessing information in terminal equipment -- Consent, transparency and the use of cookie notices and consent tools -- Types of cookies -- Cookies, behavioural advertising and real-time bidding -- Cookies and legal risk -- Direct marketing -- The position under PECR -- Postal direct marketing -- Opt-out, as a matter of law -- Financial penalties for direct marketing contraventions -- Processing of traffic data, location data and value added services -- Security and personal data breach notification -- Personal data breaches -- Expanded rules for breach notifications -- Interplay with the breach notification rules in the GDPR.
Calling line ID and directories of subscribers -- Law reform underway -- Summary -- 4. INTRODUCTION TO OPERATIONAL DATA PROTECTION -- Operational adequacy schemes - implementing data protection (operationalisation) -- Focus on operational adequacy schemes -- The three layers of an organisation -- Implementing data protection in the people layer -- Governance structures -- Steering committee -- Recruitment and onboarding -- Education and training -- Access rights and privileges -- Monitoring -- Worker discipline -- Flowing requirements to data processors -- Implementing data protection in the paper layer -- Data Protection by Design and Default (DPbDD, or PbD) -- Governance structures -- Records of processing activities -- Risk registers and assessment tools and methodologies -- Legitimate interests assessments -- Transfer assessments -- Transparency notices -- Contracts and similar documents -- Policies, procedures and controls frameworks -- Records of significant events -- Programme and project plans -- Technology architecture -- Assurance records -- Other mechanisms for assurance -- Implementing data protection in the technology and data layer -- Privacy Enhancing Technologies -- Regulatory sandboxes -- 'The Journey to Code' -- Risk management - implementing measures to assess risks to rights and freedoms and the appropriateness of controls -- The adequacy test -- The impact of the 'consensus of professional opinion' - what are the risks and what should be done about them? -- Risk management - dealing with adverse scrutiny -- Globalisation - implementing data protection on an international stage -- International transfers - adequacy, appropriate safeguards and derogations -- Meaning of 'adequacy' for the purposes of international transfers -- Adequacy of the UK -- Appropriate safeguards -- Derogations.
Wider operational challenges of international activities -- Impacts for micro, small and medium-sized enterprises -- Size of enterprise and size of risk -- Financial resources, cost and risk -- Security and connection to wider legal and operational frameworks -- Summary -- PART II CORE LAW -- 5. THE PRINCIPLES OF DATA PROTECTION -- A constant presence in data protection law -- The duty of compliance (accountability) -- Lawfulness, fairness and transparency - the first principle -- Lawfulness -- Fairness -- Transparency -- Purpose limitation - the second principle -- Expanded purposes - archiving in the public interest -- Expanded purposes - scientific and historical research -- Expanded purposes - statistics -- Compatibility -- Data minimisation - the third principle -- Accuracy - the fourth principle -- Storage limitation - the fifth principle -- Integrity and confidentiality (including security) - the sixth principle -- Accountability - the seventh principle -- Lawfulness of processing of personal data (Article 6) -- Categorising the lawful bases of processing -- Consent -- Contract -- Legal obligation -- Vital interests -- Public task -- Legitimate interests -- Lawfulness of processing - special category personal data and criminal convictions and offences -- The ban on processing special category personal data - enhanced sensitivity, risks and legal requirement -- Summary -- 6. THE RIGHTS OF DATA SUBJECTS -- Informing and empowering the protected party -- Transparency and information rights -- General obligation of transparency - GDPR A. -- Obtaining transparency - GDPR A.13 and -- The right of access to information - A. -- Personal data breaches - Article -- Rights over data processing -- Right to rectification - A. -- Right to erasure, or 'the right to be forgotten' - A. -- Right to restriction of processing - A.
Right to data portability - A. -- Right to object - A. -- Right not to be subject to automated decision making, including profiling - A. -- Remedies and rights of redress -- Summary -- PART III OPERATING INTERNATIONALLY -- 7. NATIONAL SUPERVISION WITHIN AN INTERNATIONAL FRAMEWORK -- National regulatory systems and divergences -- GDPR solution for international processing -- Establishment of supervisory authorities -- General conditions for members of supervisory authorities -- Independence -- Interference -- Supervisory authority competence -- Member competence -- Tasks -- Monitoring -- Promotion and awareness -- Advice and administration -- Rights, complaints and enforcement -- Powers -- Lead supervisory authorities -- Cross-border processing -- Cooperation and mutual assistance -- Choosing a lead supervisory authority -- Appointing an EU Representative -- Summary -- 8. TRANSFERRING DATA BETWEEN THE GDPR LAND MASS AND THIRD COUNTRIES -- Why regulate international transfers? -- What is a transfer? -- General principles for transfers -- Transfers on the basis of an adequacy decision -- Elements considered in assessing adequacy -- Adequacy decisions issued -- UK adequacy -- Partial adequacy decisions -- Ongoing monitoring of adequacy decisions -- Transfers subject to appropriate safeguards -- Standard contractual clauses -- Derogations for specific situations -- Relying on the derogations in practice -- Compelling legitimate interests -- Litigation on international data transfers -- Schrems I - Safe Harbor decision declared invalid -- Schrems II - Privacy Shield declared invalid and SCCs declared valid subject to certain conditions -- Navigating international data transfers -- EDPB's six-step recommendations -- Supplementary measures -- A practical approach to international transfers -- Getting to know your 'special characteristics' -- Understanding the 'zone of precedent'.
Record Nr. UNINA-9910959054903321
Room Stewart  
Swindon : , : BCS Learning & Development Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Driving Data Projects : A Comprehensive Guide
Driving Data Projects : A Comprehensive Guide
Autore Haskell Christine
Edizione [1st ed.]
Pubbl/distr/stampa Swindon : , : BCS Learning & Development Limited, , 2024
Descrizione fisica 1 online resource (299 pages)
Disciplina 006.312
Soggetto topico Technological innovations - Management
Information technology - Management
Strategic planning
ISBN 9781780176253
1780176252
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910985654703321
Haskell Christine  
Swindon : , : BCS Learning & Development Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Growing Yourself as a Leader / / Chatham, Robina
Growing Yourself as a Leader / / Chatham, Robina
Autore Chatham Robina
Edizione [1st edition]
Pubbl/distr/stampa BCS Learning & Development Limited, , 2018
Descrizione fisica 1 online resource (124 pages)
Disciplina 658.4092
Soggetto topico Leadership
Industrial management
ISBN 9781523116904
1523116900
9781780173870
1780173873
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9911006958603321
Chatham Robina  
BCS Learning & Development Limited, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hands-on incident response and digital forensics / / Mike Sheward
Hands-on incident response and digital forensics / / Mike Sheward
Autore Sheward Mike
Edizione [1st edition]
Pubbl/distr/stampa Swindon : , : BCS Learning & Development Limited, , [2018]
Descrizione fisica 1 online resource (1 volume) : illustrations
Disciplina 363.25968
Soggetto topico Computer crimes - Investigation
Computer networks - Security measures
ISBN 1-5231-4821-7
1-78017-423-3
1-78017-422-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910796939603321
Sheward Mike  
Swindon : , : BCS Learning & Development Limited, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui