All listings for this product
Best-selling in Adult Learning & University
Save on Adult Learning & University
- £17.73Trending at £20.04
- £9.22Trending at £9.29
- £24.56Trending at £25.99
- £26.45Trending at £27.68
- £19.99Trending at £23.76
- £28.00Trending at £30.19
- £15.72Trending at £15.91
About this product
- Author(s)Balaji Raghunathan
- PublisherTaylor & Francis Ltd
- Date of Publication28/05/2013
- GenreComputing: Professional & Programming
- Series TitleInfosys Press
- Place of PublicationLondon
- Country of PublicationUnited Kingdom
- ImprintAuerbach Publishers Inc.
- Content Note95 black & white illustrations, 69 black & white tables
- Weight612 g
- Width156 mm
- Height235 mm
- Spine23 mm
- Format DetailsUnsewn / adhesive bound
- Table Of ContentsOverview of Data Anonymization Points to Ponder PII PHI What is Data Anonymization? What are the Drivers for Data Anonymization? The Need To Protect Sensitive Data Handled As Part Of Business Increasing Instances of Insider Data Leakage, Misuse of Personal Data and the Lure of Money for Mischievous Insiders Employees Getting Even With Employers Negligence of Employees to Sensitivity of Personal Data Astronomical Cost to the Business due to Misuse of Personal Data Risks Arising out of Operational Factors Like Outsourcing and Partner Collaboration Outsourcing Of IT Application Development, Testing And Support Increasing Collaboration With Partners Legal and Compliance Requirements Will Procuring and Implementing a Data Anonymization Tool by Itself Ensure Protection of Privacy of Sensitive Data? Ambiguity of Operational Aspects Allowing the Same Users to Access both Masked and Unmasked Environment Lack Of Buy-In From IT Application Developers, Testers and End-Users Compartmentalized Approach to Data Anonymization Absence of Data Privacy Protection Policies or Weak enforcement of Data Privacy Policies Benefits Of Data Anonymization Implementation DATA ANONYMIZATION PROGRAM SPONSOR'S GUIDEBOOK Enterprise Data Privacy Governance Model Points to Ponder Chief Privacy Officer Unit /Department Privacy Compliance Officers The Steering Committee for Data Privacy Protection Initiatives Management Representatives Information Security And Risk Department Representatives Representatives from the Department Security and Privacy Compliance Officers Incident Response Team The Role of the Employee in Privacy Protection The Role of the CIO Typical Ways Enterprises Enforce Privacy Policies Enterprise Data Classification Policy and Privacy Laws Points to Ponder Regulatory Compliance Enterprise Data Classification Points to Consider Controls For Each Class Of Enterprise Data Operational Processes, Guidelines and Controls for Enterprise Data Privacy Protection Points to Ponder Privacy Incident Management Planning for Incident Resolution Preparation Incident Capture Incident Response Post Incident Analysis Guidelines and Best Practices PII/PHI Collection Guidelines Guidelines for Storage and Transmission of PII/PHI PII/PHI Usage Guidelines Guidelines for Storing PII/PHI on Portable Devices and Storage Devices Guidelines for Staff The Different Phases of a Data Anonymization Program Points to Ponder How Should I Go about the Enterprise Data Anonymization Program? The Assessment Phase Tool Evaluation and Solution Definition Phase Data Anonymization Implementation Phase Operations Phase or the Steady-State phase Food For Thought When Should the Organization Invest on a Data Anonymization Exercise? The Organization's Security Policies Anyway Mandate Authorization to be Built-in For Every Application. Won't This be Sufficient? Why is Data Anonymization Needed? Is there a Business Case for Data Anonymization Program in My Organization? When Can a Data Anonymization Program be Called as a Successful One? Why Should I go for a Data Anonymization Tool when SQL Encryption Scripts Can be Used to Anonymize Data? What are the Benefits Provided by Data Masking Tools for Data Anonymization? Why is a Tool Evaluation Phase Needed? Who Should Implement Data Anonymization? Should it be the Tool Vendor or the IT Service Partner or External Consultants or Internal Employees? How Many Rounds of Testing Must be Planned to Certify that Application Behavior is Unchanged with use of Anonymized Data? Departments Involved in Enterprise Data Anonymization Program Points to Ponder The Role of the Information Security and Risk Department The Role of the Legal Department The Role of Application Owners and Business Analysts The Role of Administrators The Role of the Project Management Offic
- Author BiographyBalaji Raghunathan has more than 15 years of experience in the software industry and has spent a large part of his working career in software architecture and information management. He has been with Infosys for the last 10 years. In 2009, Raghunathan was introduced to data anonymization and ever since has been fascinated by this art and science of leaving users in doubt as to whether the data are real or anonymized. He is convinced that this is a valuable trick enterprises need to adopt in order to prevent misuse of personal data they handle and he has helped some of Infosys clients play these tricks systematically. He is a TOGAF 8.0 and ICMG-WWISA Certified Software Architect and has worked on data nonymization solutions for close to two years in multiple roles. Prior to 2009, Raghunathan has been involved in architecting software solutions for the energy, utilities, publishing, transportation, retail, and banking industries. Raghunathan has a postgraduate diploma in business administration (finance) from Symbiosis Institute (SCDL), Pune, India and has an engineering degree (electrical and electronics) from Bangalore University, India.
This item doesn't belong on this page.
Thanks, we'll look into this.