close menu
Bookswagon-24x7 online bookstore
close menu
My Account
Home > Computing and Information Technology > Computer security > Privacy and data protection > Building Effective Privacy Programs: Cybersecurity from Principles to Practice
47%
Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape

In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy.

Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more.

Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs:

  • Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics
  • Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications
  • Offers strategies to integrate privacy principles into business processes and IT systems
  • Covers industry-specific applications for healthcare, finance, and technology sectors
  • Highlights successful privacy program implementations and lessons learned from enforcement actions
  • Includes glossaries, comparison charts, sample policies, and additional resources for quick reference

Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.



Table of Contents:

Preface xi

Acknowledgement xiii

1 Introduction to Privacy 1

Definition and Importance of Privacy 1

Historical Perspective on Privacy 5

Modern Privacy Challenges 10

Recommendations 16

Chapter Conclusion 17

Questions 17

2 Understanding Personal Data 21

Definition and Types of Personal Data 21

Sensitive Personal Data 27

Data Combinations and Anonymization 32

Recommendations 37

Chapter Conclusion 38

Questions 38

3 Data Processing 41

Definition and Types of Processing 42

Legal Bases for Processing 48

Data Processing Principles 54

Recommendations 60

Chapter Conclusion 60

Questions 61

4 Roles and Relationships 65

Data Controller vs. Data Processor 65

Subprocessors 75

Data Subjects and Their Rights 80

Recommendations 84

Chapter Conclusion 85

Questions 86

5 Privacy Impact Assessments 89

Purpose and Benefits of PIA 89

Conducting a PIA 94

Example of PIA 96

PIA Templates and Examples 101

Recommendations 107

Chapter Conclusion 108

Questions 109

6 Roles in Privacy Leadership 113

Chief Privacy Officer 113

Chief Information Security Officer 116

Data Protection Officer 118

Privacy Champions 121

Privacy Engineers 123

Recommendations 127

Chapter Conclusion 129

Questions 129

7 Data Subject Rights 133

Foundational Frameworks 133

Handling Data Subject Requests 140

DSR Tools and Techniques 145

Recommendations 151

Chapter Conclusion 152

Questions 152

8 Privacy Frameworks and Standards 157

NIST Privacy Framework: Mapping Organizational Practices to the Framework 157

Iso/iec 27701 160

Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD 166

Recommendations 172

Chapter Conclusion 173

Questions 174

9 Major Privacy Laws and Regulations 177

Laws and Regulations 177

California Consumer Privacy Act 185

Health Insurance Portability and Accountability Act 190

Comparative Analysis of Global Regulations 198

Recommendations 200

Chapter Conclusion 201

Questions 202

10 International Privacy Concerns 205

Cross-Border Data Transfers 205

Adequacy Decisions 213

BCRs and SCCs 218

Recommendations 223

Chapter Conclusion 224

Questions 225

11 Regulatory Enforcement 229

Role of DPAs 229

Case Studies of Regulatory Actions 240

Recommendations 244

Chapter Conclusion 246

Questions 246

12 Privacy by Design and Default 251

Principles of Privacy by Design 251

Implementing Privacy by Default 255

Case Studies and Best Practices 258

Recommendations 262

Chapter Conclusion 263

Questions 263

13 Privacy Technology and Tools 267

PETs: Anonymization vs. Pseudonymization 267

Data Masking and Encryption 270

Privacy Management Software 275

Recommendations 278

Chapter Conclusion 280

Questions 280

14 Data Breach Management 283

Identifying and Responding to Data Breaches 283

Notification Requirements 288

Postbreach Remediation 292

Recommendations 296

Chapter Conclusion 298

Questions 298

15 Emerging Privacy Trends 301

AI and Privacy 301

IoT and Privacy 305

Blockchain and Privacy 310

Recommendations 315

Chapter Conclusion 316

Questions 317

16 Privacy Program Implementation 321

Establishing a Privacy Governance Structure 321

Developing Privacy Policies and Procedures 326

Implementing Privacy Controls and Measures 333

Monitoring and Reporting on Privacy Compliance 339

Continuous Improvement of the Privacy Program 346

Recommendations 354

Chapter Conclusion 355

Questions 356

17 Privacy Training and Awareness 359

Developing Effective Privacy Training Programs 359

Engaging Employees in Privacy Awareness 364

Training Tools and Resources 368

Sample Annual Privacy Training Plan 369

Recommendations 372

Chapter Conclusion 373

Questions 373

18 Privacy Audits and Assessments 377

Essential Program Components 377

Using Assessment Tools 382

Integrating Assessments with Risk Management 385

Reporting and Follow-Up Actions 387

Recommendations 389

Chapter Conclusion 390

Questions 390

Answers 395

Index 421


Best Seller

| | See All


Product Details
  • ISBN-13: 9781394342631
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 282 mm
  • No of Pages: 448
  • Spine Width: 32 mm
  • Weight: 1366 gr
  • ISBN-10: 1394342632
  • Publisher Date: 02 Oct 2025
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Sub Title: Cybersecurity from Principles to Practice
  • Width: 223 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Building Effective Privacy Programs: Cybersecurity from Principles to Practice
John Wiley & Sons Inc -
Building Effective Privacy Programs: Cybersecurity from Principles to Practice
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    | | See All


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA