Agile Foundations [[electronic resource] ] : Principles, practices and frameworks
| Agile Foundations [[electronic resource] ] : Principles, practices and frameworks |
| Autore | Measey Peter |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Swindon, : BCS Learning & Development Limited, 2015 |
| Descrizione fisica | 1 online resource (199 p.) |
| Disciplina | 005.1 |
| Altri autori (Persone) |
BerridgeChris
GrayAlex WolfLazaro MeaseyPeter OliverLes RobertsBarbara ShortMichael WilmshurstDarren |
| Soggetto topico |
Agile software development
Computer science User interfaces (Computer systems) Engineering & Applied Sciences Computer Science |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-68015-721-3
1-78017-255-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Copyright; CONTENTS; LIST OF FIGURES AND TABLES; CONTRIBUTORS; SECTION REVIEWERS; GLOSSARY; PREFACE; INTRODUCTION; PART 1 INTRODUCING AGILE; 1. WHAT IS AGILE?; 1.1 THE HISTORY OF AGILE; 1.2 THE AGILE MANIFESTO; 2. THE FOUNDATIONS OF AGILE; 2.1 THE AGILE MINDSET; 2.2 DELIVERY ENVIRONMENTS AND AGILE SUITABILITY; 2.3 THE LIFECYCLE OF PRODUCT DEVELOPMENT; 2.4 THE 'IRON TRIANGLE'; 2.5 WORKING WITH UNCERTAINTY AND VOLATILITY; 2.6 EMPIRICAL AND DEFINED PROCESSES; 3. AGILE AND THE BUSINESS; 3.1 THE ECONOMIC CASE FOR AGILE; 3.2 BUSINESS CULTURE AND AGILE; 4. AGILE MYTHS
PART 2 A GENERIC AGILE FRAMEWORK5. GENERIC AGILE PROCESS; 5.1 AGILE OPERATING MODEL; 6. COMMON AGILE ROLES; 6.1 THE CUSTOMER; 6.2 THE TEAM; 6.3 THE AGILE LEAD; 6.4 THE STAKEHOLDERS; 7. COMMON AGILE TECHNIQUES; 7.1 STORIES AND BACKLOG REFINEMENT; 7.2 AGILE ESTIMATION; 7.3 AGILE PLANNING; 7.4 AGILE TESTING; 8. COMMON AGILE PRACTICES; 8.1 SHORT FEEDBACK LOOPS; 8.2 FACE-TO-FACE COMMUNICATION; 8.3 DAILY STAND-UPS; 8.4 SHOW AND TELLS; 8.5 RETROSPECTIVES; 8.6 EMERGENT DOCUMENTATION; 8.7 VISUAL BOARDS; 8.8 SUSTAINABLE PACE; 8.9 FOCUS ON QUALITY; 8.10 MAJOR AGILE TECHNICAL PRACTICES PART 3 APPLYING AGILE PRINCIPLES9. INDIVIDUALS AND INTERACTIONS OVER PROCESSES AND TOOLS; 9.1 MOTIVATED AND TALENTED INDIVIDUALS; 9.2 EMERGENT DESIGN FROM SELF-ORGANISING TEAMS; 9.3 TEAM DYNAMICS; 10. WORKING SOFTWARE OVER COMPREHENSIVE DOCUMENTATION; 10.1 SATISFY THE CUSTOMER AND CONTINUOUS DELIVERY OF VALUE; 10.2 DELIVER WORKING SOFTWARE FREQUENTLY; 10.3 WORKING SOFTWARE AS A MEASURE OF PROGRESS; 10.4 TECHNICAL EXCELLENCE AND GOOD DESIGN; 11. CUSTOMER COLLABORATION OVER CONTRACT NEGOTIATIONS; 11.1 BUSINESS PEOPLE AND DEVELOPERS MUST WORK TOGETHER 11.2 REFLECT AND ADJUST (INSPECT AND ADAPT) REGULARLY12. RESPONDING TO CHANGE OVER FOLLOWING A PLAN; 12.1 EMBRACE CHANGE; 13. SIMPLICITY; 13.1 FIT-FOR-PURPOSE PRODUCTS; 13.2 FIT-FOR-PURPOSE DELIVERY; PART 4 AGILE FRAMEWORKS; 14. MAJOR AGILE FRAMEWORKS; 14.1 EXTREME PROGRAMMING (XP); 14.2 SCRUM; 14.3 DSDM; 14.4 AGILE PROJECT MANAGEMENT; 14.5 KANBAN; 14.6 LEAN SOFTWARE DEVELOPMENT; 14.7 LEAN START-UP; 14.8 SCALED AGILE FRAMEWORK (SAFE); REFERENCES; RECOMMENDED FURTHER READING OR 'WHAT'S ON OUR OFFICE BOOKSHELF'; INDEX; Back Cover |
| Record Nr. | UNINA-9910460161603321 |
Measey Peter
|
||
| Swindon, : BCS Learning & Development Limited, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Agile Foundations : Principles, practices and frameworks
| Agile Foundations : Principles, practices and frameworks |
| Autore | Measey Peter |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Swindon, : BCS Learning & Development Limited, 2015 |
| Descrizione fisica | 1 online resource (199 p.) |
| Disciplina | 005.1 |
| Altri autori (Persone) |
BerridgeChris
GrayAlex WolfLazaro MeaseyPeter OliverLes RobertsBarbara ShortMichael WilmshurstDarren |
| Soggetto topico |
Agile software development
Computer science User interfaces (Computer systems) Engineering & Applied Sciences Computer Science |
| ISBN |
1-68015-721-3
1-78017-255-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover; Copyright; CONTENTS; LIST OF FIGURES AND TABLES; CONTRIBUTORS; SECTION REVIEWERS; GLOSSARY; PREFACE; INTRODUCTION; PART 1 INTRODUCING AGILE; 1. WHAT IS AGILE?; 1.1 THE HISTORY OF AGILE; 1.2 THE AGILE MANIFESTO; 2. THE FOUNDATIONS OF AGILE; 2.1 THE AGILE MINDSET; 2.2 DELIVERY ENVIRONMENTS AND AGILE SUITABILITY; 2.3 THE LIFECYCLE OF PRODUCT DEVELOPMENT; 2.4 THE 'IRON TRIANGLE'; 2.5 WORKING WITH UNCERTAINTY AND VOLATILITY; 2.6 EMPIRICAL AND DEFINED PROCESSES; 3. AGILE AND THE BUSINESS; 3.1 THE ECONOMIC CASE FOR AGILE; 3.2 BUSINESS CULTURE AND AGILE; 4. AGILE MYTHS
PART 2 A GENERIC AGILE FRAMEWORK5. GENERIC AGILE PROCESS; 5.1 AGILE OPERATING MODEL; 6. COMMON AGILE ROLES; 6.1 THE CUSTOMER; 6.2 THE TEAM; 6.3 THE AGILE LEAD; 6.4 THE STAKEHOLDERS; 7. COMMON AGILE TECHNIQUES; 7.1 STORIES AND BACKLOG REFINEMENT; 7.2 AGILE ESTIMATION; 7.3 AGILE PLANNING; 7.4 AGILE TESTING; 8. COMMON AGILE PRACTICES; 8.1 SHORT FEEDBACK LOOPS; 8.2 FACE-TO-FACE COMMUNICATION; 8.3 DAILY STAND-UPS; 8.4 SHOW AND TELLS; 8.5 RETROSPECTIVES; 8.6 EMERGENT DOCUMENTATION; 8.7 VISUAL BOARDS; 8.8 SUSTAINABLE PACE; 8.9 FOCUS ON QUALITY; 8.10 MAJOR AGILE TECHNICAL PRACTICES PART 3 APPLYING AGILE PRINCIPLES9. INDIVIDUALS AND INTERACTIONS OVER PROCESSES AND TOOLS; 9.1 MOTIVATED AND TALENTED INDIVIDUALS; 9.2 EMERGENT DESIGN FROM SELF-ORGANISING TEAMS; 9.3 TEAM DYNAMICS; 10. WORKING SOFTWARE OVER COMPREHENSIVE DOCUMENTATION; 10.1 SATISFY THE CUSTOMER AND CONTINUOUS DELIVERY OF VALUE; 10.2 DELIVER WORKING SOFTWARE FREQUENTLY; 10.3 WORKING SOFTWARE AS A MEASURE OF PROGRESS; 10.4 TECHNICAL EXCELLENCE AND GOOD DESIGN; 11. CUSTOMER COLLABORATION OVER CONTRACT NEGOTIATIONS; 11.1 BUSINESS PEOPLE AND DEVELOPERS MUST WORK TOGETHER 11.2 REFLECT AND ADJUST (INSPECT AND ADAPT) REGULARLY12. RESPONDING TO CHANGE OVER FOLLOWING A PLAN; 12.1 EMBRACE CHANGE; 13. SIMPLICITY; 13.1 FIT-FOR-PURPOSE PRODUCTS; 13.2 FIT-FOR-PURPOSE DELIVERY; PART 4 AGILE FRAMEWORKS; 14. MAJOR AGILE FRAMEWORKS; 14.1 EXTREME PROGRAMMING (XP); 14.2 SCRUM; 14.3 DSDM; 14.4 AGILE PROJECT MANAGEMENT; 14.5 KANBAN; 14.6 LEAN SOFTWARE DEVELOPMENT; 14.7 LEAN START-UP; 14.8 SCALED AGILE FRAMEWORK (SAFE); REFERENCES; RECOMMENDED FURTHER READING OR 'WHAT'S ON OUR OFFICE BOOKSHELF'; INDEX; Back Cover |
| Record Nr. | UNINA-9911006889003321 |
Measey Peter
|
||
| Swindon, : BCS Learning & Development Limited, 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The autonomous enterprise : powered by AI / / Sarah Burnett
| The autonomous enterprise : powered by AI / / Sarah Burnett |
| Autore | Burnett Sarah |
| Pubbl/distr/stampa | England : , : BCS Learning & Development Limited, , [2022] |
| Descrizione fisica | 1 online resource (221 pages) |
| Disciplina | 658.0563 |
| Soggetto topico | Artificial intelligence |
| ISBN | 1-78017-584-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover -- Half-Title Page -- Bcs, The Chartered Institute For It -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Author -- Foreword by Professor Leslie Willcocks -- Acknowledgements -- Abbreviations -- Glossary -- Useful websites -- Preface -- PART 1: THE RISE OF THE AUTONOMOUS ENTERPRISE -- 1. INTRODUCTION AND OVERVIEW -- What is the autonomous enterprise and why we need to learn about it? -- The birth of the autonomous enterprise -- AI for innovation -- AI for efficiency -- Going from digital to phygital -- AI adoption -- Summary -- 2. WHAT YOU NEED TO KNOW ABOUT AI -- The evolution of AI and why it is rapidly advancing now -- Breaking it down: Making AI work for you -- Summary -- 3. AI FOR INNOVATION -- Applying AI to innovation in your business -- AI and creativity -- The AI fountain -- Summary -- 4. AI FOR EFFICIENCY -- Bringing AI for efficiency to life -- What is intelligent automation? -- The role of IA in business efficiency -- IA technologies -- Summary -- PART 2: CASE STUDIES -- 5. THE BIONIC CUSTOMER SERVICE AGENT AT SIEMENS GLOBAL BUSINESS SERVICES -- About Siemens Global Business Services -- The business context -- The bionic agent for service ticket processing -- Summary -- 6. RETAINING THE HUMAN TOUCH AT CALDERDALE COUNCIL -- Background -- About Calderdale Council -- The business context -- Introducing VIRA -- Summary -- 7. AI IMPROVING STROKE CARE AT THE ROYAL BERKSHIRE NHS FOUNDATION TRUST -- About RBFT -- The healthcare context -- Under the hood of the technology -- Summary -- 8. AI IN SALES OPTIMISATION AT WÄRTSILÄ -- About Wärtsilä -- The business context -- The sales optimisation solution -- Summary -- PART 3: THE SHAPE OF THINGS TO COME - THE AUTONOMOUS ENTERPRISE -- 9. THE AUTONOMOUS ENTERPRISE -- The start of the journey -- Autonomous enterprise definition.
Turning knowledge processes inside out -- The autonomous enterprise mindset -- The ongoing autonomous enterprise journey -- How things can go wrong -- Summary -- 10. AUTOMATION AND SOCIETY -- Jobs for humans -- Creation of new roles -- AI ethics -- Ethical technology -- AI for good -- Summary -- Afterword -- References -- Further reading -- Index. |
| Record Nr. | UNINA-9910795675903321 |
Burnett Sarah
|
||
| England : , : BCS Learning & Development Limited, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The autonomous enterprise : powered by AI / / Sarah Burnett
| The autonomous enterprise : powered by AI / / Sarah Burnett |
| Autore | Burnett Sarah |
| Pubbl/distr/stampa | England : , : BCS Learning & Development Limited, , [2022] |
| Descrizione fisica | 1 online resource (221 pages) |
| Disciplina | 658.0563 |
| Soggetto topico | Artificial intelligence |
| ISBN | 1-78017-584-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover -- Half-Title Page -- Bcs, The Chartered Institute For It -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Author -- Foreword by Professor Leslie Willcocks -- Acknowledgements -- Abbreviations -- Glossary -- Useful websites -- Preface -- PART 1: THE RISE OF THE AUTONOMOUS ENTERPRISE -- 1. INTRODUCTION AND OVERVIEW -- What is the autonomous enterprise and why we need to learn about it? -- The birth of the autonomous enterprise -- AI for innovation -- AI for efficiency -- Going from digital to phygital -- AI adoption -- Summary -- 2. WHAT YOU NEED TO KNOW ABOUT AI -- The evolution of AI and why it is rapidly advancing now -- Breaking it down: Making AI work for you -- Summary -- 3. AI FOR INNOVATION -- Applying AI to innovation in your business -- AI and creativity -- The AI fountain -- Summary -- 4. AI FOR EFFICIENCY -- Bringing AI for efficiency to life -- What is intelligent automation? -- The role of IA in business efficiency -- IA technologies -- Summary -- PART 2: CASE STUDIES -- 5. THE BIONIC CUSTOMER SERVICE AGENT AT SIEMENS GLOBAL BUSINESS SERVICES -- About Siemens Global Business Services -- The business context -- The bionic agent for service ticket processing -- Summary -- 6. RETAINING THE HUMAN TOUCH AT CALDERDALE COUNCIL -- Background -- About Calderdale Council -- The business context -- Introducing VIRA -- Summary -- 7. AI IMPROVING STROKE CARE AT THE ROYAL BERKSHIRE NHS FOUNDATION TRUST -- About RBFT -- The healthcare context -- Under the hood of the technology -- Summary -- 8. AI IN SALES OPTIMISATION AT WÄRTSILÄ -- About Wärtsilä -- The business context -- The sales optimisation solution -- Summary -- PART 3: THE SHAPE OF THINGS TO COME - THE AUTONOMOUS ENTERPRISE -- 9. THE AUTONOMOUS ENTERPRISE -- The start of the journey -- Autonomous enterprise definition.
Turning knowledge processes inside out -- The autonomous enterprise mindset -- The ongoing autonomous enterprise journey -- How things can go wrong -- Summary -- 10. AUTOMATION AND SOCIETY -- Jobs for humans -- Creation of new roles -- AI ethics -- Ethical technology -- AI for good -- Summary -- Afterword -- References -- Further reading -- Index. |
| Record Nr. | UNINA-9910823984403321 |
Burnett Sarah
|
||
| England : , : BCS Learning & Development Limited, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Business analysis / / Debra Paul and James Cadle
| Business analysis / / Debra Paul and James Cadle |
| Autore | Paul Debra |
| Edizione | [Fourth edition.] |
| Pubbl/distr/stampa | Swindon, United Kingdom : , : BCS Learning & Development Limited, , 2020 |
| Descrizione fisica | 1 online resource (439 pages) : illustrations |
| Disciplina | 658.4012 |
| Soggetto topico |
Business analysts
Business planning Organizational effectiveness |
| ISBN |
9781523148295
1523148292 9781780175126 1780175124 9781780175119 1780175116 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911007384503321 |
Paul Debra
|
||
| Swindon, United Kingdom : , : BCS Learning & Development Limited, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data protection and compliance / / Stewart Room
| Data protection and compliance / / Stewart Room |
| Autore | Room Stewart |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Swindon : , : BCS Learning & Development Limited, , 2021 |
| Descrizione fisica | 1 online resource (543 pages) : illustrations |
| Disciplina | 342.4 |
| Altri autori (Persone) |
RoomStewart
Maher O'BrienNiall PanagiotopoulosAdam NahidShervin HallRichard ThuraisingamTughan Drury-SmithJames DavisSimon |
| Soggetto topico |
Data protection - Law and legislation - Great Britain
Privacy, Right of - Great Britain Records - Law and legislation - Great Britain |
| ISBN | 1-78017-526-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover -- Half-Title Page -- BCS, THE CHARTERED INSTITUTE FOR IT -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Contributors -- Copyright notices -- Abbreviations -- Preface -- PART I THE BIG PICTURE -- 1. INTRODUCTION TO DATA PROTECTION -- What is data protection? -- Does data protection mean privacy? -- What is privacy? -- Are there exceptions to the right to privacy? -- What else should be protected? -- Protecting fundamental rights and freedoms ('human rights') -- Protecting the free movement of personal data (data flows, transfers and shares) -- The protected activities -- Protecting processing -- Protecting personal data undergoing processing -- Special category data (or 'sensitive personal data') -- Thematic priorities of data protection, trends and hot topics - supporting a risk-based approach -- AdTech and cookies -- Advanced technology and data processing techniques -- Advanced surveillance -- Artificial intelligence -- Automated facial recognition -- Connected vehicles -- Children -- Cybersecurity -- Data subject rights - timetable breaches -- Democracy -- HR problems -- International transfers -- Privacy and electronic communications ('ePrivacy') -- Profiling -- Virtual voice assistants -- Core law -- The UK Data Protection Act and its relationship to the GDPR and other EU law -- The Data Protection Convention -- Regulatory guidance and decisions -- Court judgments -- Related law -- Data protection penalties and litigation -- The regulatory bear market -- Summary -- 2. INTRODUCTION TO THE GDPR -- Brexit: the impacts for data protection and the impacts for this book -- The land mass in Europe to which the GDPR applies -- Recitals and articles of the GDPR -- Jurisdiction of the GDPR -- Nationality and location of people -- A.3.1 - processing in the context of EU establishments.
A.3.2 - targeting people in the EU -- Material scope of the GDPR -- The building blocks of the GDPR -- The actors -- Compliance framework - the standards of protection -- Data protection principles -- Lawful bases of processing -- Necessity -- Consent for processing -- Compliance framework - controls -- Appropriate technical and organisational measures -- Appropriate safeguards -- Prescribed controls -- Anonymisation and pseudonymisation -- Accountability -- Assessing appropriateness of controls -- Critical outcomes to be achieved -- Transparency -- Clarity of the lawful basis of processing -- Control -- Compensatory mechanisms to remedy non-compliance -- Regulator's enforcement powers -- Data subjects' enforcement powers -- Where the GDPR does not apply - exceptions and restrictions -- Domestic processing -- Restrictions and the UK DPA -- Brexit - the UK, Frozen and EU GDPR -- UK GDPR -- Frozen GDPR -- Brexit - international transfers of data -- Summary -- 3. INTRODUCTION TO EPRIVACY -- Regulating the electronic communications sector -- The relationship between data protection and ePrivacy -- The actors and protected parties -- Confidentiality of communications -- Exceptions to confidentiality -- Consent for storing or accessing information in terminal equipment -- Consent, transparency and the use of cookie notices and consent tools -- Types of cookies -- Cookies, behavioural advertising and real-time bidding -- Cookies and legal risk -- Direct marketing -- The position under PECR -- Postal direct marketing -- Opt-out, as a matter of law -- Financial penalties for direct marketing contraventions -- Processing of traffic data, location data and value added services -- Security and personal data breach notification -- Personal data breaches -- Expanded rules for breach notifications -- Interplay with the breach notification rules in the GDPR. Calling line ID and directories of subscribers -- Law reform underway -- Summary -- 4. INTRODUCTION TO OPERATIONAL DATA PROTECTION -- Operational adequacy schemes - implementing data protection (operationalisation) -- Focus on operational adequacy schemes -- The three layers of an organisation -- Implementing data protection in the people layer -- Governance structures -- Steering committee -- Recruitment and onboarding -- Education and training -- Access rights and privileges -- Monitoring -- Worker discipline -- Flowing requirements to data processors -- Implementing data protection in the paper layer -- Data Protection by Design and Default (DPbDD, or PbD) -- Governance structures -- Records of processing activities -- Risk registers and assessment tools and methodologies -- Legitimate interests assessments -- Transfer assessments -- Transparency notices -- Contracts and similar documents -- Policies, procedures and controls frameworks -- Records of significant events -- Programme and project plans -- Technology architecture -- Assurance records -- Other mechanisms for assurance -- Implementing data protection in the technology and data layer -- Privacy Enhancing Technologies -- Regulatory sandboxes -- 'The Journey to Code' -- Risk management - implementing measures to assess risks to rights and freedoms and the appropriateness of controls -- The adequacy test -- The impact of the 'consensus of professional opinion' - what are the risks and what should be done about them? -- Risk management - dealing with adverse scrutiny -- Globalisation - implementing data protection on an international stage -- International transfers - adequacy, appropriate safeguards and derogations -- Meaning of 'adequacy' for the purposes of international transfers -- Adequacy of the UK -- Appropriate safeguards -- Derogations. Wider operational challenges of international activities -- Impacts for micro, small and medium-sized enterprises -- Size of enterprise and size of risk -- Financial resources, cost and risk -- Security and connection to wider legal and operational frameworks -- Summary -- PART II CORE LAW -- 5. THE PRINCIPLES OF DATA PROTECTION -- A constant presence in data protection law -- The duty of compliance (accountability) -- Lawfulness, fairness and transparency - the first principle -- Lawfulness -- Fairness -- Transparency -- Purpose limitation - the second principle -- Expanded purposes - archiving in the public interest -- Expanded purposes - scientific and historical research -- Expanded purposes - statistics -- Compatibility -- Data minimisation - the third principle -- Accuracy - the fourth principle -- Storage limitation - the fifth principle -- Integrity and confidentiality (including security) - the sixth principle -- Accountability - the seventh principle -- Lawfulness of processing of personal data (Article 6) -- Categorising the lawful bases of processing -- Consent -- Contract -- Legal obligation -- Vital interests -- Public task -- Legitimate interests -- Lawfulness of processing - special category personal data and criminal convictions and offences -- The ban on processing special category personal data - enhanced sensitivity, risks and legal requirement -- Summary -- 6. THE RIGHTS OF DATA SUBJECTS -- Informing and empowering the protected party -- Transparency and information rights -- General obligation of transparency - GDPR A. -- Obtaining transparency - GDPR A.13 and -- The right of access to information - A. -- Personal data breaches - Article -- Rights over data processing -- Right to rectification - A. -- Right to erasure, or 'the right to be forgotten' - A. -- Right to restriction of processing - A. Right to data portability - A. -- Right to object - A. -- Right not to be subject to automated decision making, including profiling - A. -- Remedies and rights of redress -- Summary -- PART III OPERATING INTERNATIONALLY -- 7. NATIONAL SUPERVISION WITHIN AN INTERNATIONAL FRAMEWORK -- National regulatory systems and divergences -- GDPR solution for international processing -- Establishment of supervisory authorities -- General conditions for members of supervisory authorities -- Independence -- Interference -- Supervisory authority competence -- Member competence -- Tasks -- Monitoring -- Promotion and awareness -- Advice and administration -- Rights, complaints and enforcement -- Powers -- Lead supervisory authorities -- Cross-border processing -- Cooperation and mutual assistance -- Choosing a lead supervisory authority -- Appointing an EU Representative -- Summary -- 8. TRANSFERRING DATA BETWEEN THE GDPR LAND MASS AND THIRD COUNTRIES -- Why regulate international transfers? -- What is a transfer? -- General principles for transfers -- Transfers on the basis of an adequacy decision -- Elements considered in assessing adequacy -- Adequacy decisions issued -- UK adequacy -- Partial adequacy decisions -- Ongoing monitoring of adequacy decisions -- Transfers subject to appropriate safeguards -- Standard contractual clauses -- Derogations for specific situations -- Relying on the derogations in practice -- Compelling legitimate interests -- Litigation on international data transfers -- Schrems I - Safe Harbor decision declared invalid -- Schrems II - Privacy Shield declared invalid and SCCs declared valid subject to certain conditions -- Navigating international data transfers -- EDPB's six-step recommendations -- Supplementary measures -- A practical approach to international transfers -- Getting to know your 'special characteristics' -- Understanding the 'zone of precedent'. |
| Record Nr. | UNINA-9910795328403321 |
Room Stewart
|
||
| Swindon : , : BCS Learning & Development Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data protection and compliance / / Stewart Room
| Data protection and compliance / / Stewart Room |
| Autore | Room Stewart |
| Edizione | [2nd ed.] |
| Pubbl/distr/stampa | Swindon : , : BCS Learning & Development Limited, , 2021 |
| Descrizione fisica | 1 online resource (543 pages) : illustrations |
| Disciplina | 342.4 |
| Altri autori (Persone) |
RoomStewart
Maher O'BrienNiall PanagiotopoulosAdam NahidShervin HallRichard ThuraisingamTughan Drury-SmithJames DavisSimon |
| Soggetto topico | Data protection - Law and legislation - Great Britain |
| ISBN |
9781780175263
1780175264 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Front Cover -- Half-Title Page -- BCS, THE CHARTERED INSTITUTE FOR IT -- Title Page -- Copyright Page -- Contents -- List of figures and tables -- Contributors -- Copyright notices -- Abbreviations -- Preface -- PART I THE BIG PICTURE -- 1. INTRODUCTION TO DATA PROTECTION -- What is data protection? -- Does data protection mean privacy? -- What is privacy? -- Are there exceptions to the right to privacy? -- What else should be protected? -- Protecting fundamental rights and freedoms ('human rights') -- Protecting the free movement of personal data (data flows, transfers and shares) -- The protected activities -- Protecting processing -- Protecting personal data undergoing processing -- Special category data (or 'sensitive personal data') -- Thematic priorities of data protection, trends and hot topics - supporting a risk-based approach -- AdTech and cookies -- Advanced technology and data processing techniques -- Advanced surveillance -- Artificial intelligence -- Automated facial recognition -- Connected vehicles -- Children -- Cybersecurity -- Data subject rights - timetable breaches -- Democracy -- HR problems -- International transfers -- Privacy and electronic communications ('ePrivacy') -- Profiling -- Virtual voice assistants -- Core law -- The UK Data Protection Act and its relationship to the GDPR and other EU law -- The Data Protection Convention -- Regulatory guidance and decisions -- Court judgments -- Related law -- Data protection penalties and litigation -- The regulatory bear market -- Summary -- 2. INTRODUCTION TO THE GDPR -- Brexit: the impacts for data protection and the impacts for this book -- The land mass in Europe to which the GDPR applies -- Recitals and articles of the GDPR -- Jurisdiction of the GDPR -- Nationality and location of people -- A.3.1 - processing in the context of EU establishments.
A.3.2 - targeting people in the EU -- Material scope of the GDPR -- The building blocks of the GDPR -- The actors -- Compliance framework - the standards of protection -- Data protection principles -- Lawful bases of processing -- Necessity -- Consent for processing -- Compliance framework - controls -- Appropriate technical and organisational measures -- Appropriate safeguards -- Prescribed controls -- Anonymisation and pseudonymisation -- Accountability -- Assessing appropriateness of controls -- Critical outcomes to be achieved -- Transparency -- Clarity of the lawful basis of processing -- Control -- Compensatory mechanisms to remedy non-compliance -- Regulator's enforcement powers -- Data subjects' enforcement powers -- Where the GDPR does not apply - exceptions and restrictions -- Domestic processing -- Restrictions and the UK DPA -- Brexit - the UK, Frozen and EU GDPR -- UK GDPR -- Frozen GDPR -- Brexit - international transfers of data -- Summary -- 3. INTRODUCTION TO EPRIVACY -- Regulating the electronic communications sector -- The relationship between data protection and ePrivacy -- The actors and protected parties -- Confidentiality of communications -- Exceptions to confidentiality -- Consent for storing or accessing information in terminal equipment -- Consent, transparency and the use of cookie notices and consent tools -- Types of cookies -- Cookies, behavioural advertising and real-time bidding -- Cookies and legal risk -- Direct marketing -- The position under PECR -- Postal direct marketing -- Opt-out, as a matter of law -- Financial penalties for direct marketing contraventions -- Processing of traffic data, location data and value added services -- Security and personal data breach notification -- Personal data breaches -- Expanded rules for breach notifications -- Interplay with the breach notification rules in the GDPR. Calling line ID and directories of subscribers -- Law reform underway -- Summary -- 4. INTRODUCTION TO OPERATIONAL DATA PROTECTION -- Operational adequacy schemes - implementing data protection (operationalisation) -- Focus on operational adequacy schemes -- The three layers of an organisation -- Implementing data protection in the people layer -- Governance structures -- Steering committee -- Recruitment and onboarding -- Education and training -- Access rights and privileges -- Monitoring -- Worker discipline -- Flowing requirements to data processors -- Implementing data protection in the paper layer -- Data Protection by Design and Default (DPbDD, or PbD) -- Governance structures -- Records of processing activities -- Risk registers and assessment tools and methodologies -- Legitimate interests assessments -- Transfer assessments -- Transparency notices -- Contracts and similar documents -- Policies, procedures and controls frameworks -- Records of significant events -- Programme and project plans -- Technology architecture -- Assurance records -- Other mechanisms for assurance -- Implementing data protection in the technology and data layer -- Privacy Enhancing Technologies -- Regulatory sandboxes -- 'The Journey to Code' -- Risk management - implementing measures to assess risks to rights and freedoms and the appropriateness of controls -- The adequacy test -- The impact of the 'consensus of professional opinion' - what are the risks and what should be done about them? -- Risk management - dealing with adverse scrutiny -- Globalisation - implementing data protection on an international stage -- International transfers - adequacy, appropriate safeguards and derogations -- Meaning of 'adequacy' for the purposes of international transfers -- Adequacy of the UK -- Appropriate safeguards -- Derogations. Wider operational challenges of international activities -- Impacts for micro, small and medium-sized enterprises -- Size of enterprise and size of risk -- Financial resources, cost and risk -- Security and connection to wider legal and operational frameworks -- Summary -- PART II CORE LAW -- 5. THE PRINCIPLES OF DATA PROTECTION -- A constant presence in data protection law -- The duty of compliance (accountability) -- Lawfulness, fairness and transparency - the first principle -- Lawfulness -- Fairness -- Transparency -- Purpose limitation - the second principle -- Expanded purposes - archiving in the public interest -- Expanded purposes - scientific and historical research -- Expanded purposes - statistics -- Compatibility -- Data minimisation - the third principle -- Accuracy - the fourth principle -- Storage limitation - the fifth principle -- Integrity and confidentiality (including security) - the sixth principle -- Accountability - the seventh principle -- Lawfulness of processing of personal data (Article 6) -- Categorising the lawful bases of processing -- Consent -- Contract -- Legal obligation -- Vital interests -- Public task -- Legitimate interests -- Lawfulness of processing - special category personal data and criminal convictions and offences -- The ban on processing special category personal data - enhanced sensitivity, risks and legal requirement -- Summary -- 6. THE RIGHTS OF DATA SUBJECTS -- Informing and empowering the protected party -- Transparency and information rights -- General obligation of transparency - GDPR A. -- Obtaining transparency - GDPR A.13 and -- The right of access to information - A. -- Personal data breaches - Article -- Rights over data processing -- Right to rectification - A. -- Right to erasure, or 'the right to be forgotten' - A. -- Right to restriction of processing - A. Right to data portability - A. -- Right to object - A. -- Right not to be subject to automated decision making, including profiling - A. -- Remedies and rights of redress -- Summary -- PART III OPERATING INTERNATIONALLY -- 7. NATIONAL SUPERVISION WITHIN AN INTERNATIONAL FRAMEWORK -- National regulatory systems and divergences -- GDPR solution for international processing -- Establishment of supervisory authorities -- General conditions for members of supervisory authorities -- Independence -- Interference -- Supervisory authority competence -- Member competence -- Tasks -- Monitoring -- Promotion and awareness -- Advice and administration -- Rights, complaints and enforcement -- Powers -- Lead supervisory authorities -- Cross-border processing -- Cooperation and mutual assistance -- Choosing a lead supervisory authority -- Appointing an EU Representative -- Summary -- 8. TRANSFERRING DATA BETWEEN THE GDPR LAND MASS AND THIRD COUNTRIES -- Why regulate international transfers? -- What is a transfer? -- General principles for transfers -- Transfers on the basis of an adequacy decision -- Elements considered in assessing adequacy -- Adequacy decisions issued -- UK adequacy -- Partial adequacy decisions -- Ongoing monitoring of adequacy decisions -- Transfers subject to appropriate safeguards -- Standard contractual clauses -- Derogations for specific situations -- Relying on the derogations in practice -- Compelling legitimate interests -- Litigation on international data transfers -- Schrems I - Safe Harbor decision declared invalid -- Schrems II - Privacy Shield declared invalid and SCCs declared valid subject to certain conditions -- Navigating international data transfers -- EDPB's six-step recommendations -- Supplementary measures -- A practical approach to international transfers -- Getting to know your 'special characteristics' -- Understanding the 'zone of precedent'. |
| Record Nr. | UNINA-9910959054903321 |
Room Stewart
|
||
| Swindon : , : BCS Learning & Development Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Driving Data Projects : A Comprehensive Guide
| Driving Data Projects : A Comprehensive Guide |
| Autore | Haskell Christine |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Swindon : , : BCS Learning & Development Limited, , 2024 |
| Descrizione fisica | 1 online resource (299 pages) |
| Disciplina | 006.312 |
| Soggetto topico |
Technological innovations - Management
Information technology - Management Strategic planning |
| ISBN |
9781780176253
1780176252 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910985654703321 |
Haskell Christine
|
||
| Swindon : , : BCS Learning & Development Limited, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Growing Yourself as a Leader / / Chatham, Robina
| Growing Yourself as a Leader / / Chatham, Robina |
| Autore | Chatham Robina |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | BCS Learning & Development Limited, , 2018 |
| Descrizione fisica | 1 online resource (124 pages) |
| Disciplina | 658.4092 |
| Soggetto topico |
Leadership
Industrial management |
| ISBN |
9781523116904
1523116900 9781780173870 1780173873 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9911006958603321 |
Chatham Robina
|
||
| BCS Learning & Development Limited, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hands-on incident response and digital forensics / / Mike Sheward
| Hands-on incident response and digital forensics / / Mike Sheward |
| Autore | Sheward Mike |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Swindon : , : BCS Learning & Development Limited, , [2018] |
| Descrizione fisica | 1 online resource (1 volume) : illustrations |
| Disciplina | 363.25968 |
| Soggetto topico |
Computer crimes - Investigation
Computer networks - Security measures |
| ISBN |
1-5231-4821-7
1-78017-423-3 1-78017-422-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910796939603321 |
Sheward Mike
|
||
| Swindon : , : BCS Learning & Development Limited, , [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||