Safeguarding Critical E-Documents Implementing a Program for Securing Confidential Information Assets

ISBN-10: 111815908X

ISBN-13: 9781118159088

Edition: 2012

List price: $60.00 Buy it from $33.33
eBook available
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description:

Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business recordsManagers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance on protecting sensitive and confidential documents—even if they leave the organization electronically or on portable devicesPresents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communicationsOffers a concise format for securing your organizations from information leakageIn light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations.
Used Starting from $33.33
eBooks Starting from $75.00
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Customers also bought
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $60.00
Copyright year: 2012
Publisher: John Wiley & Sons, Limited
Publication date: 8/10/2012
Binding: Hardcover
Pages: 263
Size: 6.50" wide x 9.50" long x 1.25" tall
Weight: 1.056
Language: English

Foreword
Preface
Acknowledgments
The Problem and Basic Tools
The Problem: Securing Confidential Electronic Documents
WikiLeaks: A Wake-Up Call
U.S. Government Attempts to Protect Intellectual Property
Threats Persist across the Pond: U.K. Companies on Guard
Increase in Corporate and Industrial Espionage
Risks of Medical Identity Theft
Why Don't Organizations Safeguard Their Information Assets?
The Blame Game: Where Does Fault Lie When Information Is Leaked?
Consequences of Not Employing E-Document Security
Notes
Information Governance: The Crucial First Step
First, Better Policies; Then, Better Technology for Better Enforcement
Defining Information Governance
Accountability Is Key
Why IG Is Good Business
Impact of a Successful IG Program
Critical Factors in an IG Program
Who Should Determine IG Policies?
Notes
Information Platform Risks and Countermeasures
Managing E-Documents and Records
Enterprise Content Management
Document Management Principles
The Goal: Document Lifecycle Security
Electronic Document Management Systems
Records Management Principles
Electronic Records Management
Notes
Information Governance and Security for E-mail Messages
Employees Regularly Expose Organizations to E-mail Risk
E-mail Policies Should Be Realistic and Technology Agnostic
Is E-mail Encryption the Answer?
Common E-mail Security Mistakes
E-mail Security Myths
E-record Retention: Fundamentally a Legal Issue
Preserve E-mail Integrity and Admissibility with Automatic Archiving
Notes
Information Governance and Security for Instant Messaging
Instant Messaging Security Threats
Best Practices for Business IM Use
Technology to Monitor IM
Tips for Safer IM
Notes
Information Governance and Security for Social Media
Types of Social Media in Web 2:0
Social Media in the Enterprise
Key Ways Social Media Is Different from E-mail and Instant Messaging
Biggest Security Threats of Social Media
Legal Risks of Social Media Posts
Tools to Archive Facebook and Twitter
IG Considerations for Social Media
Notes
Information Governance and Security for Mobile Devices
Current Trends in Mobile Computing
Security Risks of Mobile Computing
Securing Mobile Data
IG for Mobile Computing
Building Security into Mobile Applications
Best Practices to Secure Mobile Applications
Notes
Information Governance and Security for Cloud Computing Use
Defining Cloud Computing
Key Characteristics of Cloud Computing
What Cloud Computing Really Means
Cloud Deployment Models
Greatest Security Threats to Cloud Computing
IG Guidelines: Managing Documents and Records in the Cloud
Managing E-Docs and Records in the Cloud: A Practical Approach
Notes
E-Records Considerations
Information Governance and Security for Vital Records
Defining Vital Records
Types of Vital Records
Impact of Losing Vital Records
Creating, Implementing, and Maintaining a Vital Records Program
Implementing Protective Procedures
Auditing the Vital Records Program
Notes
Long-Term Preservation of E-Records
Defining Long-Term Digital Preservation
Key Factors in LTDP
Electronic Records Preservation Processes
Controlling the Process of Preserving Records
Notes
Information Technology Considerations
Technologies That Can Help Secure E-Documents
Challenge of Securing E-Documents
Apply Better Technology for Better Enforcement in the Extended Enterprise
Controlling Access to Documents Using Identity Access Management
Enforcing IG: Protect Files with Rules and Permissions
Data Governance Software to Manage Information Access
E-mail Encryption
Secure Communications Using Record-Free E-mail
Digital Signatures
Document Encryption
Data Loss Prevention Technology
The Missing Piece: Information Rights Management
Notes
Safeguarding Confidential Information Assets
Cyber Attacks Proliferate
The Insider Threat: Malicious or Not
Critical Technologies for Securing Confidential Documents
A Hybrid Approach: Combining DLP and IRM Technologies
Securing Trade Secrets after Layoffs and Terminations
Persistently Protecting Blueprints and CAD Documents
Securing Internal Price Lists
Approaches for Securing Data Once It Leaves the Organization
Document Labeling
Document Analytics
Confidential Stream Messaging
Notes
Rolling it out: Project and Program Issues
Building the Business Case to Justify the Program
Determine What Will Fly in Your Organization
Strategic Business Drivers for Project Justification
Benefits of Electronic Records Management
Presenting the Business Case
Notes
Securing Executive Sponsorship
Executive Sponsor Role
Project Manager: Key Tasks
It's the Little Things
Evolving Role of the Executive Sponsor
Notes
Safeguarding Confidential Information Assets: Where Do You Start?
Business Driver Approach
Classification
Document Survey Methodology
Interviewing Staff in the Target Area
Preparing Interview Questions
Prioritizing: Document and Records Value Assessment
Second Phase of Implementation
Notes
Procurement: The Buying Process
Evaluation and Selection Process: RFI, RFP, or RFQ?
Evaluating Software Providers: Key Criteria
Negotiating Contracts: Ensuring the Decision
More Contract Caveats
How to Pick a Consulting Firm: Evaluation Criteria
Maintaining a Secure Environment for Information Assets
Monitoring and Accountability
Continuous Process Improvement
Why Continuous Improvement Is Needed
Notes
Conclusion
Digital Signature Standard
Regulations Belated to Records Management
Listing of Technology and Service Providers
Glossary
About the Author
Index
×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×