Data Protection for Slightly Bigger Companies


Book Description

This practical hand book is designed to help small and slightly larger businesses look after their information and the information they hold on behalf of customers, clients and employees. It covers the Data Protection Act and other similar legislation, standards for data protection (BS10012) and information security (ISO27001) and is designed to help companies highlight their risks, weaknesses and threats.




GDPR For Dummies


Book Description

Don’t be afraid of the GDPR wolf! How can your business easily comply with the new data protection and privacy laws and avoid fines of up to $27M? GDPR For Dummies sets out in simple steps how small business owners can comply with the complex General Data Protection Regulations (GDPR). These regulations apply to all businesses established in the EU and to businesses established outside of the EU insofar as they process personal data about people within the EU. Inside, you’ll discover how GDPR applies to your business in the context of marketing, employment, providing your services, and using service providers. Learn how to avoid fines, regulatory investigations, customer complaints, and brand damage, while gaining a competitive advantage and increasing customer loyalty by putting privacy at the heart of your business. Find out what constitutes personal data and special category data Gain consent for online and offline marketing Put your Privacy Policy in place Report a data breach before being fined 79% of U.S. businesses haven’t figured out how they’ll report breaches in a timely fashion, provide customers the right to be forgotten, conduct privacy impact assessments, and more. If you are one of those businesses that hasn't put a plan in place, then GDPR For Dummies is for you.




The EU General Data Protection Regulation (GDPR)


Book Description

This new book provides an article-by-article commentary on the new EU General Data Protection Regulation. Adopted in April 2016 and applicable from May 2018, the GDPR is the centrepiece of the recent reform of the EU regulatory framework for protection of personal data. It replaces the 1995 EU Data Protection Directive and has become the most significant piece of data protection legislation anywhere in the world. The book is edited by three leading authorities and written by a team of expert specialists in the field from around the EU and representing different sectors (including academia, the EU institutions, data protection authorities, and the private sector), thus providing a pan-European analysis of the GDPR. It examines each article of the GDPR in sequential order and explains how its provisions work, thus allowing the reader to easily and quickly elucidate the meaning of individual articles. An introductory chapter provides an overview of the background to the GDPR and its place in the greater structure of EU law and human rights law. Account is also taken of closely linked legal instruments, such as the Directive on Data Protection and Law Enforcement that was adopted concurrently with the GDPR, and of the ongoing work on the proposed new E-Privacy Regulation.




The EU General Data Protection Regulation (GDPR)


Book Description

This book provides expert advice on the practical implementation of the European Union’s General Data Protection Regulation (GDPR) and systematically analyses its various provisions. Examples, tables, a checklist etc. showcase the practical consequences of the new legislation. The handbook examines the GDPR’s scope of application, the organizational and material requirements for data protection, the rights of data subjects, the role of the Supervisory Authorities, enforcement and fines under the GDPR, and national particularities. In addition, it supplies a brief outlook on the legal consequences for seminal data processing areas, such as Cloud Computing, Big Data and the Internet of Things.Adopted in 2016, the General Data Protection Regulation will come into force in May 2018. It provides for numerous new and intensified data protection obligations, as well as a significant increase in fines (up to 20 million euros). As a result, not only companies located within the European Union will have to change their approach to data security; due to the GDPR’s broad, transnational scope of application, it will affect numerous companies worldwide.




Big Data Analytics


Book Description

This volume explores the diverse applications of advanced tools and technologies of the emerging field of big data and their evidential value in business. It examines the role of analytics tools and methods of using big data in strengthening businesses to meet today’s information challenges and shows how businesses can adapt big data for effective businesses practices. This volume shows how big data and the use of data analytics is being effectively adopted more frequently, especially in companies that are looking for new methods to develop smarter capabilities and tackle challenges in dynamic processes. Many illustrative case studies are presented that highlight how companies in every sector are now focusing on harnessing data to create a new way of doing business.




Data Protection and Privacy, Volume 15


Book Description

This book offers conceptual analyses, highlights issues, proposes solutions, and discusses practices regarding privacy and data protection in transitional times. It is one of the results of the 15th annual International Conference on Computers, Privacy and Data Protection (CPDP), which was held in Brussels in May 2022. We are in a time of transition. Artificial Intelligence is making significant breakthroughs in how humans use data and information, and is changing our lives in virtually all aspects. The pandemic has pushed society to adopt changes in how, when, why, and the media through which, we interact. A new generation of European digital regulations - such as the AI Act, Digital Services Act, Digital Markets Act, Data Governance Act, and Data Act - is on the horizon. This raises difficult questions as to which rights we should have, the degree to which these rights should be balanced against other poignant social interests, and how these rights should be enforced in light of the fluidity and uncertainty of circumstances. The book covers a range of topics, including: data protection risks in European retail banks; data protection, privacy legislation, and litigation in China; synthetic data generation as a privacy-preserving technique for the training of machine learning models; effectiveness of privacy consent dialogues; legal analysis of the role of individuals in data protection law; and the role of data subject rights in the platform economy. This interdisciplinary book has been written at a time when the scale and impact of data processing on society – on individuals as well as on social systems – is becoming ever more important. It discusses open issues as well as daring and prospective approaches and is an insightful resource for readers with an interest in computers, privacy and data protection.




Disrupt Or Die


Book Description

With cyclonic technologies like AI and automation sweeping the globe, established industries can be shaken up or taken down in less time and with less effort than ever before. Businesses big and small need a revolutionary, not evolutionary, digital strategy. Thankfully, serial entrepreneur and CEO Jedidiah Yueh has compiled an arsenal of essential frameworks to help companies survive and thrive in the digital era. With more than twenty years of experience as a digital disruptor, Yueh provides business owners and executives with the critical insights into why current efforts are failing and the tools to build digital products for sustainability, profitability, and survival. Whether you're an experienced executive, working in a startup, or just interested in technology, this book will help you reap the benefits of the digital renaissance instead of suffering from a digital apocalypse.




Fundamentals of Clinical Data Science


Book Description

This open access book comprehensively covers the fundamentals of clinical data science, focusing on data collection, modelling and clinical applications. Topics covered in the first section on data collection include: data sources, data at scale (big data), data stewardship (FAIR data) and related privacy concerns. Aspects of predictive modelling using techniques such as classification, regression or clustering, and prediction model validation will be covered in the second section. The third section covers aspects of (mobile) clinical decision support systems, operational excellence and value-based healthcare. Fundamentals of Clinical Data Science is an essential resource for healthcare professionals and IT consultants intending to develop and refine their skills in personalized medicine, using solutions based on large datasets from electronic health records or telemonitoring programmes. The book’s promise is “no math, no code”and will explain the topics in a style that is optimized for a healthcare audience.




Big Data For Small Business For Dummies


Book Description

Capitalise on big data to add value to your small business Written by bestselling author and big data expert Bernard Marr, Big Data For Small Business For Dummies helps you understand what big data actually is—and how you can analyse and use it to improve your business. Free of confusing jargon and complemented with lots of step-by-step guidance and helpful advice, it quickly and painlessly helps you get the most from using big data in a small business. Business data has been around for a long time. Unfortunately, it was trapped away in overcrowded filing cabinets and on archaic floppy disks. Now, thanks to technology and new tools that display complex databases in a much simpler manner, small businesses can benefit from the big data that's been hiding right under their noses. With the help of this friendly guide, you'll discover how to get your hands on big data to develop new offerings, products and services; understand technological change; create an infrastructure; develop strategies; and make smarter business decisions. Shows you how to use big data to make sense of user activity on social networks and customer transactions Demonstrates how to capture, store, search, share, analyse and visualise analytics Helps you turn your data into actionable insights Explains how to use big data to your advantage in order to transform your small business If you're a small business owner or employee, Big Data For Small Business For Dummies helps you harness the hottest commodity on the market today in order to take your company to new heights.




Penetration Testing


Book Description

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: –Crack passwords and wireless network keys with brute-forcing and wordlists –Test web applications for vulnerabilities –Use the Metasploit Framework to launch exploits and write your own Metasploit modules –Automate social-engineering attacks –Bypass antivirus software –Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.