Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Building Effective Privacy Programs (eBook)

Cybersecurity from Principles to Practice
eBook Download: EPUB
2025
1213 Seiten
Wiley (Verlag)
978-1-394-34264-8 (ISBN)

Lese- und Medienproben

Building Effective Privacy Programs - Jason Edwards, Griffin Weaver
Systemvoraussetzungen
87,99 inkl. MwSt
(CHF 85,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape

In today's data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy.

Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more.

Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs:

  • Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics
  • Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications
  • Offers strategies to integrate privacy principles into business processes and IT systems
  • Covers industry-specific applications for healthcare, finance, and technology sectors
  • Highlights successful privacy program implementations and lessons learned from enforcement actions
  • Includes glossaries, comparison charts, sample policies, and additional resources for quick reference

Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn.

Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights.


Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today s data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topicsPresents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implicationsOffers strategies to integrate privacy principles into business processes and IT systemsCovers industry-specific applications for healthcare, finance, and technology sectorsHighlights successful privacy program implementations and lessons learned from enforcement actionsIncludes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

Chapter 1
Introduction to Privacy


Privacy is a deeply personal and universal concept that touches every aspect of human life. The boundary allows individuals to define their sense of self, maintain autonomy, and navigate relationships on their terms. Yet, privacy is also a societal construct shaped by cultural values, historical events, and technological advancements. In today’s interconnected world, the meaning and scope of privacy are more complex than ever, influenced by the digital revolution, global regulations, and shifting societal expectations. Understanding privacy requires exploring its origins and evolution and examining its contemporary challenges and implications.

Privacy has taken many forms throughout history, from the architectural layouts of ancient homes to the legal protections of personal correspondence. Ancient civilizations recognized the importance of safeguarding personal space and family matters, linking privacy to honor, dignity, and societal roles. The invention of the printing press brought a seismic shift, enabling mass communication and the dissemination of personal information on an unprecedented scale. This marked the beginning of modern privacy concerns as individuals grappled with the public exposure of private lives. Each technological leap, from the printing press to the Internet, has redefined the boundaries of privacy, introducing both opportunities and risks.

The digital age represents the most profound transformation of privacy yet. Data is now a currency that corporations, governments, and individuals collect and trade. Social media platforms encourage users to share their lives openly, often without full awareness of how their information is used or stored. At the same time, governments employ sophisticated surveillance technologies for security, raising concerns about the erosion of civil liberties and the potential for abuse. The balance between individual rights and societal needs has never been more precarious as privacy becomes a central issue in policy, law, and ethics.

By exploring the roots and evolution of privacy, this chapter aims to provide a comprehensive perspective on why privacy matters and how it shapes our lives. It invites readers to consider privacy, not a static concept but a dynamic interplay of individual autonomy, societal values, and technological progress. As we navigate the complexities of the digital age, as shown in Figure 1.1, understanding the historical and cultural foundations of privacy is essential for creating a future that respects and protects this fundamental human right.

Figure 1.1 Historical evolution of privacy timeline.

Definition and Importance of Privacy


Privacy controls access to personal information, thoughts, and actions, creating boundaries for safeguarding individual autonomy and dignity. It is a fundamental human right, underpinning the freedom to think, express, and live without undue interference or surveillance. Beyond its personal significance, privacy is essential for societal well-being, fostering trust, innovation, and democratic participation. In an era where data flows freely across borders and technologies monitor every interaction, understanding the definition and importance of privacy is critical. It serves as both a shield for individuals and a cornerstone for ethical and sustainable societal structures, ensuring a balance between personal freedoms and collective progress.

Legal Definitions Across Jurisdictions


Understanding the legal definitions of privacy is a critical foundation for building effective privacy programs. These definitions vary widely across jurisdictions, influenced by cultural, historical, and governmental factors. Privacy often refers to the individual’s right to control personal information, but the legal interpretation of this principle is anything but universal. For organizations, navigating these variations is not just a compliance requirement but a strategic necessity in a globalized world. A company operating across borders must be equipped to handle a patchwork of privacy regulations, each demanding unique considerations and tailored approaches.

Privacy as a Fundamental Human Right: The European Union

In the European Union, privacy is a fundamental human right, codified in the EU Charter of Fundamental Rights. This perspective is operationalized through the General Data Protection Regulation (GDPR), one of the world’s most stringent and comprehensive privacy laws. GDPR broadly defines personal data, encompassing any information that can identify an individual, such as names, email addresses, and IP addresses. The regulation’s primary goal is to empower individuals with control over their data, emphasizing principles like data minimization and explicit consent.

The GDPR imposes strict compliance requirements on organizations, with penalties for violations reaching up to 4% of annual global turnover or €20 million, whichever is higher. Its extraterritorial scope ensures that companies outside the EU handling data of EU residents must also comply, extending its influence beyond European borders. However, implementing GDPR principles in practice often proves to be challenging, as businesses must align their operations with rigorous standards without disrupting productivity. This has led to the GDPR becoming a global benchmark, inspiring similar legislation in other regions, though many struggle to achieve its level of enforcement and clarity.

The GDPR also emphasizes transparency, requiring organizations to inform individuals how their data is collected and used. This fosters trust between businesses and consumers, a critical factor in the digital economy. Yet, the administrative burden of maintaining compliance, such as appointing data protection officers and conducting regular impact assessments, often overwhelms smaller organizations. Despite these challenges, the GDPR represents a paradigm shift in privacy, setting a high bar for respecting individual autonomy in the digital age.

A Patchwork of Protections: The United States

The United States takes a markedly different approach to privacy, adopting a fragmented system rather than a unified federal law like the GDPR. The US privacy regulations are largely sector-specific, addressing particular industries or data types. For example, the Health Insurance Portability and Accountability Act (HIPAA) governs the use and protection of health information, while the Gramm–Leach–Bliley Act (GLBA) applies to financial institutions. This piecemeal approach reflects that the United States prioritizes market innovation and economic freedom over comprehensive privacy regulation.

At the state level, laws like the California Consumer Privacy Act (CCPA) and its successor, the California Privacy Rights Act (CPRA), have emerged to fill gaps in federal oversight. These laws grant California residents rights similar to those under the GDPR, such as the ability to access, delete, and opt out of the sale of their data. However, the absence of a national standard creates a compliance headache for companies operating across multiple states. Each state’s unique requirements can conflict, forcing businesses to adopt complex and often costly compliance strategies.

The fragmented approach in the United States often leaves significant gaps in data protection, particularly in emerging areas like artificial intelligence (AI) and biometric data. Critics argue that this patchwork of laws fails to provide consistent protections for individuals, leaving many vulnerable to misuse of their personal information. This system requires flexibility and a profound understanding of regulatory nuances for organizations. Successful privacy programs in the United States depend on navigating this maze effectively while maintaining operational efficiency.

Privacy with a Different Lens: China

China’s approach to privacy reflects its broader governmental priorities, which emphasize state security and economic development over individual rights. The Personal Information Protection Law (PIPL), China’s primary privacy legislation, outlines strict rules for data handling, emphasizing data localization and government access. Unlike the GDPR, which focuses on empowering individuals, the PIPL prioritizes national interests, requiring companies to store sensitive data within Chinese borders and conduct mandatory security assessments before transferring data abroad.

While the PIPL grants individuals certain rights, such as the ability to access and correct their data, these rights exist within a framework heavily influenced by state oversight. Organizations operating in China must be prepared for extensive compliance obligations, including establishing mechanisms for government data access and ensuring robust cybersecurity measures. The penalties for noncompliance are severe, ranging from hefty fines to suspension of business operations, making adherence to Chinese privacy laws a high-stakes endeavor.

China’s privacy laws also highlight a cultural divergence in the global conversation about privacy. Where Western frameworks often center on individual autonomy, China’s model underscores the collective good and the state’s role in safeguarding societal stability. This creates a unique challenge for multinational corporations: respecting local laws without alienating global stakeholders with different expectations about privacy and transparency. Navigating these tensions requires legal expertise, cultural sensitivity, and strategic foresight.

A Balancing Act: Control, Autonomy, and Security

Privacy is, at its core,...

Erscheint lt. Verlag 15.8.2025
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Schlagworte AI and Privacy • blockchain privacy • cyberprivacy • cybersecurity • Cybersecurity Law • Data Breach Management • data privacy impact assessment • data privacy laws • data privacy programs • data privacy regulatory compliance • data protection • IoT Privacy
ISBN-10 1-394-34264-0 / 1394342640
ISBN-13 978-1-394-34264-8 / 9781394342648
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Design scalable and high-performance Java applications with Spring

von Wanderson Xesquevixos

eBook Download (2025)
Packt Publishing (Verlag)
CHF 31,65