did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781118159088

Safeguarding Critical E-Documents Implementing a Program for Securing Confidential Information Assets

by ;
  • ISBN13:

    9781118159088

  • ISBN10:

    111815908X

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2012-07-31
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $75.00 Save up to $24.37
  • Rent Book $64.31
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 2-3 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications. Provides practical, step-by-step guidance on protecting sensitive and confidential documents-even if they leave the organization electronically or on portable devices Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications Offers a concise format for securing your organizations from information leakage In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organizations reputation and leading to costly investigations.

Author Biography

ROBERT F. SMALLWOOD is a Partner and Executive Director of the E-Records Institute at IMERGE Consulting. One of the world's most respected authorities on e-records and document management, he has published more research reports on e-records, e-documents, and e-mail security issues over the past five years than any other person or organization. His research and consulting clients include Johnson & Johnson, IBM, Apple, MillerCoors, Ricoh Americas Corporation, South Carolina Retirement Systems, Dallas Independent School District, U.S. FDA, National Archives and Records Administration, Transportation Safety Board of Canada, Canadian Parliament, Supreme Court of Canada, Canada Mortgage and Housing Corporation, and National Archives of Australia, among others.

Table of Contents

Forewordp. xiii
Prefacep. xv
Acknowledgmentsp. xvii
The Problem and Basic Tools
The Problem: Securing Confidential Electronic Documentsp. 3
WikiLeaks: A Wake-Up Callp. 3
U.S. Government Attempts to Protect Intellectual Propertyp. 5
Threats Persist across the Pond: U.K. Companies on Guardp. 5
Increase in Corporate and Industrial Espionagep. 6
Risks of Medical Identity Theftp. 7
Why Don't Organizations Safeguard Their Information Assets?p. 8
The Blame Game: Where Does Fault Lie When Information Is Leaked?p. 9
Consequences of Not Employing E-Document Securityp. 10
Notesp. 11
Information Governance: The Crucial First Stepp. 13
First, Better Policies; Then, Better Technology for Better Enforcementp. 13
Defining Information Governancep. 14
Accountability Is Keyp. 16
Why IG Is Good Businessp. 17
Impact of a Successful IG Programp. 18
Critical Factors in an IG Programp. 19
Who Should Determine IG Policies?p. 22
Notesp. 23
Information Platform Risks and Countermeasures
Managing E-Documents and Recordsp. 27
Enterprise Content Managementp. 27
Document Management Principlesp. 28
The Goal: Document Lifecycle Securityp. 29
Electronic Document Management Systemsp. 29
Records Management Principlesp. 31
Electronic Records Managementp. 31
Notesp. 33
Information Governance and Security for E-mail Messagesp. 35
Employees Regularly Expose Organizations to E-mail Riskp. 36
E-mail Policies Should Be Realistic and Technology Agnosticp. 37
Is E-mail Encryption the Answer?p. 38
Common E-mail Security Mistakesp. 39
E-mail Security Mythsp. 40
E-record Retention: Fundamentally a Legal Issuep. 41
Preserve E-mail Integrity and Admissibility with Automatic Archivingp. 42
Notesp. 46
Information Governance and Security for Instant Messagingp. 49
Instant Messaging Security Threatsp. 50
Best Practices for Business IM Usep. 51
Technology to Monitor IMp. 53
Tips for Safer IMp. 53
Notesp. 55
Information Governance and Security for Social Mediap. 57
Types of Social Media in Web 2:0p. 57
Social Media in the Enterprisep. 59
Key Ways Social Media Is Different from E-mail and Instant Messagingp. 60
Biggest Security Threats of Social Mediap. 60
Legal Risks of Social Media Postsp. 63
Tools to Archive Facebook and Twitterp. 64
IG Considerations for Social Mediap. 65
Notesp. 66
Information Governance and Security for Mobile Devicesp. 69
Current Trends in Mobile Computingp. 71
Security Risks of Mobile Computingp. 72
Securing Mobile Datap. 73
IG for Mobile Computingp. 73
Building Security into Mobile Applicationsp. 75
Best Practices to Secure Mobile Applicationsp. 78
Notesp. 80
Information Governance and Security for Cloud Computing Usep. 83
Defining Cloud Computingp. 84
Key Characteristics of Cloud Computingp. 85
What Cloud Computing Really Meansp. 86
Cloud Deployment Modelsp. 87
Greatest Security Threats to Cloud Computingp. 87
IG Guidelines: Managing Documents and Records in the Cloudp. 94
Managing E-Docs and Records in the Cloud: A Practical Approachp. 95
Notesp. 97
E-Records Considerations
Information Governance and Security for Vital Recordsp. 101
Defining Vital Recordsp. 101
Types of Vital Recordsp. 103
Impact of Losing Vital Recordsp. 104
Creating, Implementing, and Maintaining a Vital Records Programp. 105
Implementing Protective Proceduresp. 108
Auditing the Vital Records Programp. 111
Notesp. 113
Long-Term Preservation of E-Recordsp. 115
Defining Long-Term Digital Preservationp. 115
Key Factors in LTDPp. 116
Electronic Records Preservation Processesp. 118
Controlling the Process of Preserving Recordsp. 118
Notesp. 121
Information Technology Considerations
Technologies That Can Help Secure E-Documentsp. 125
Challenge of Securing E-Documentsp. 125
Apply Better Technology for Better Enforcement in the Extended Enterprisep. 128
Controlling Access to Documents Using Identity Access Managementp. 131
Enforcing IG: Protect Files with Rules and Permissionsp. 133
Data Governance Software to Manage Information Accessp. 133
E-mail Encryptionp. 134
Secure Communications Using Record-Free E-mailp. 134
Digital Signaturesp. 135
Document Encryptionp. 137
Data Loss Prevention Technologyp. 137
The Missing Piece: Information Rights Managementp. 139
Notesp. 144
Safeguarding Confidential Information Assetsp. 147
Cyber Attacks Proliferatep. 147
The Insider Threat: Malicious or Notp. 148
Critical Technologies for Securing Confidential Documentsp. 150
A Hybrid Approach: Combining DLP and IRM Technologiesp. 154
Securing Trade Secrets after Layoffs and Terminationsp. 155
Persistently Protecting Blueprints and CAD Documentsp. 156
Securing Internal Price Listsp. 157
Approaches for Securing Data Once It Leaves the Organizationp. 157
Document Labelingp. 159
Document Analyticsp. 161
Confidential Stream Messagingp. 161
Notesp. 164
Rolling it out: Project and Program Issues
Building the Business Case to Justify the Programp. 169
Determine What Will Fly in Your Organizationp. 169
Strategic Business Drivers for Project Justificationp. 170
Benefits of Electronic Records Managementp. 173
Presenting the Business Casep. 176
Notesp. 177
Securing Executive Sponsorshipp. 179
Executive Sponsor Rolep. 180
Project Manager: Key Tasksp. 181
It's the Little Thingsp. 183
Evolving Role of the Executive Sponsorp. 183
Notesp. 185
Safeguarding Confidential Information Assets: Where Do You Start?p. 187
Business Driver Approachp. 187
Classificationp. 188
Document Survey Methodologyp. 189
Interviewing Staff in the Target Areap. 190
Preparing Interview Questionsp. 192
Prioritizing: Document and Records Value Assessmentp. 193
Second Phase of Implementationp. 194
Notesp. 195
Procurement: The Buying Processp. 197
Evaluation and Selection Process: RFI, RFP, or RFQ?p. 197
Evaluating Software Providers: Key Criteriap. 202
Negotiating Contracts: Ensuring the Decisionp. 207
More Contract Caveatsp. 210
How to Pick a Consulting Firm: Evaluation Criteriap. 211
Maintaining a Secure Environment for Information Assetsp. 215
Monitoring and Accountabilityp. 215
Continuous Process Improvementp. 216
Why Continuous Improvement Is Neededp. 216
Notesp. 218
Conclusionp. 219
Digital Signature Standardp. 221
Regulations Belated to Records Managementp. 223
Listing of Technology and Service Providersp. 227
Glossaryp. 241
About the Authorp. 247
Indexp. 249
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program