000 | 02766nam a22003617a 4500 | ||
---|---|---|---|
001 | 22447368 | ||
003 | OSt | ||
005 | 20231208164924.0 | ||
008 | 231207b xxu||||| |||| 00| 0 eng d | ||
010 | _a 2021425739 | ||
020 |
_a9781617298998 (pbk.) _c$49.99 |
||
040 |
_aDLC _beng _erda _cDLC _dIIMU |
||
042 | _apcc | ||
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aBhajaria, Nishant, _eauthor. |
|
245 | 1 | 0 |
_aData privacy : _ba runbook for engineers / _cNishant Bhajaria ; foreword by Neil Hunt. |
264 | 1 |
_aShelter Island, NY : _bManning Publications Co., _c[2022] |
|
300 |
_axxvi, 355 p. : _bill. ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
365 |
_2GOC _a$ _b$49.99 _c₹ _d1 USD = 86.60 INR |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aContent Page: PART 1. PRIVACY, DATA, AND YOUR BUSINESS 1 PRIVACY ENGINEERING: WHY IT’S NEEDED, HOW TO SCALE IT 2 UNDERSTANDING DATA AND PRIVACY PART 2. A PROACTIVE PRIVACY PROGRAM: DATA GOVERNANCE 3 DATA CLASSIFICATION 4 DATA INVENTORY 5 DATA SHARING PART 3. BUILDING TOOLS AND PROCESSES 6 THE TECHNICAL PRIVACY REVIEW 7 DATA DELETION 8 EXPORTING USER DATA: DATA SUBJECT ACCESS REQUESTS PART 4. SECURITY, SCALING, AND STAFFING 9 BUILDING A CONSENT MANAGEMENT PLATFORM 10 CLOSING SECURITY VULNERABILITIES 11 SCALING, HIRING, AND CONSIDERING REGULATIONS | |
520 | _aSummary: Data privacy is essential for any business. Data breaches, vague policies, and poor communication all erode a user’s trust in your applications. You may also face substantial legal consequences for failing to protect user data. Fortunately, there are clear practices and guidelines to keep your data secure and your users happy. A runbook for engineers teaches you how to navigate the trade-off s between strict data security and real world business needs. In this practical book, you’ll learn how to design and implement privacy programs that are easy to scale and automate. There’s no bureaucratic process—just workable solutions and smart repurposing of existing security tools to help set and achieve your privacy goals. What's inside Classify data based on privacy risk Set up capabilities for data export that meet legal requirements Establish a review process to accelerate privacy impact assessment Design a consent management platform to capture user consent. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aPrivacy, Right of. | |
700 | 1 |
_aHunt, Neil, _eauthor of introduction, etc. |
|
856 |
_3Publisher Description and Content Page _uhttps://www.manning.com/books/data-privacy |
||
906 |
_a7 _bcbc _corigres _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2ddc _cM |
||
955 | _bBN 005.8 005570 | ||
999 |
_c13354 _d13354 |