Ardi Kolah, The GDPR Handbook: A Guide to Implementing the EU General Data Protection Regulation, KoganPage, 2018

Ardi Kolah, The GDPR Handbook: A Guide to Implementing the EU General Data Protection Regulation, KoganPage, 2018

 

About the book

The GDPR Handbook is a thorough introduction to the EU General Data Protection Regulation. It covers in detail how companies of all sizes need to operate within the GDPR requirements and how to deal with information security and risk, and specifically addresses the key duties and responsibilities of the Data Protection Officer.

Using the latest research, this book will help Data Protection Officers and businesses carry out Data Protection Impact Assessments, create and enforce data protection policies, train staff and manage data protection teams. The GDPR Handbook is the ultimate, jargon-free guide for any company or organization to interpret GDPR into clear, actionable steps.

 

Table Of Contents

    • Chapter – 00: Introduction
    • Chapter – 01: ‘Speed read’ of General Data Protection Regulation 2016/679 (GDPR);
    • Chapter – 02: The role of the Data Protection Officer (DPO);
    • Chapter – 03: The gap between policy, company appetite and reality;
    • Chapter – 04: Upward and downward communication;
    • Chapter – 05: Identifying risks;
    • Chapter – 06: Sanctions, compliance and fines;
    • Chapter – 07: The Data Protection Impact Assessment (DPIA);
    • Chapter – 08: Privacy and security breach management;
    • Chapter – 09: Managing the value chain;
    • Chapter – 10: Introducing data protection by design and by default;
    • Chapter – 11: Contracting out personal data processing;
    • Chapter – 12: Data incident breach: obligations, implications and management;
    • Chapter – 13: Security standards;
    • Chapter – 14: Implementing data protection by design and by default;
    • Chapter – 15: Technical security measures;
    • Chapter – 16: Cloud computing and bring your own devices (BYOD) in the workplace;
    • Chapter – 17: Mobile technologies;
    • Chapter – 18: The Internet of Things (IoT);
    • Chapter – 19: Trans-border personal data transfers;
    • Chapter – 20: Physical personal data records;
    • Chapter – 21: Security updates and looking towards the future;
Reclame

Lasă un răspuns

Te rog autentifică-te folosind una dintre aceste metode pentru a publica un comentariu:

Logo WordPress.com

Comentezi folosind contul tău WordPress.com. Dezautentificare /  Schimbă )

Fotografie Google+

Comentezi folosind contul tău Google+. Dezautentificare /  Schimbă )

Poză Twitter

Comentezi folosind contul tău Twitter. Dezautentificare /  Schimbă )

Fotografie Facebook

Comentezi folosind contul tău Facebook. Dezautentificare /  Schimbă )

Conectare la %s

%d blogeri au apreciat asta: