Description |
1 online resource (264 p.) |
Contents |
Cover -- Copyright Page -- CONTENTS -- LIST OF FIGURES AND TABLES -- CONTRIBUTORS -- ACKNOWLEDGEMENTS -- ABBREVIATIONS -- FOREWORD TO THE 3RD EDITION -- 1 IT CONTRACTS -- INTRODUCTION -- PARTS OF A CONTRACT -- WHO ARE YOU GOING TO CALL? -- CHECKING OUT THE SUPPLIER -- LETTER OF INTENT -- THE SUPPLIER'S TERMS -- WHAT CONTRACTS ARE THERE LIKELY TO BE? -- APPENDIX: MAIN POINTS OF AN IT CONTRACT -- 2 CLOUD COMPUTING -- INTRODUCTION -- WHAT IS CLOUD COMPUTING? -- THE EVOLUTION OF CLOUD COMPUTING -- FACTORS THAT CONTRIBUTED TO THE RISE OF CLOUD SERVICES -- CLOUD FORMATIONS -- SILVER LININGS |
|
THUNDER CLOUDS -- SUMMARY -- REFERENCES -- 3 CLOUD COMPUTING CONTRACTS -- INTRODUCTION -- PRE-CONTRACTUAL STEPS -- KEY COMMERCIAL AND LEGAL ISSUES -- SUMMARY -- 4 INTELLECTUAL PROPERTY LAW FOR COMPUTER USERS -- INTRODUCTION -- HARDWARE AND INTELLECTUAL PROPERTY RIGHTS -- SOFTWARE AND INTELLECTUAL PROPERTY RIGHTS -- DATABASES AND INTELLECTUAL PROPERTY RIGHTS -- WEBSITES AND INTELLECTUAL PROPERTY RIGHTS -- DOMAIN NAMES AND INTELLECTUAL PROPERTY RIGHTS -- THE INTERNET AND TRADE MARKS -- THE INTERNET AND COPYRIGHT AND DATABASE RIGHT |
|
APPENDIX: A BASIC GUIDE TO INTELLECTUAL PROPERTY AND RELATED RIGHTS -- TAKING ADVICE -- SUMMARY -- 5 CYBER SECURITY -- INTRODUCTION -- WHAT IS CYBER SECURITY? -- WHAT ARE THE MAIN FORMS OF CYBER ATTACK? -- WHAT ARE THE RISK AREAS? -- WHAT LAWS GOVERN CYBER SECURITY? -- WHAT PRACTICAL STEPS SHOULD YOU CONSIDER? -- WHAT GUIDES, FRAMEWORKS AND STANDARDS ARE AVAILABLE? -- SUMMARY -- REFERENCES -- 6 GDPR AND DATA PROTECTION: THE LAW -- INTRODUCTION -- WHAT DATA ARE COVERED? -- SPECIAL CATEGORIES OF PERSONAL DATA -- DATA PROTECTION PRINCIPLES -- RIGHTS OF INDIVIDUALS -- EXEMPTIONS |
|
REMEDIES, ENFORCEMENT POWERS AND PENALTIES -- SUMMARY -- 7 DATA PROTECTION IN PRACTICE -- INTRODUCTION -- DATA PROTECTION BY DESIGN AND DEFAULT -- WHAT AMOUNTS TO 'PROCESSING PERSONAL DATA' UNDER THE GDPR? -- CREATING A 'RECORD OF PROCESSING' -- DECIDING UPON THE LAWFUL BASIS OF PROCESSING -- DRAFTING DATA PROTECTION POLICIES -- DATA PROTECTION IMPACT ASSESSMENTS -- REQUESTS FROM DATA SUBJECTS -- CHILDREN'S PERSONAL DATA -- CONTROLLERS AND PROCESSORS -- SUB-PROCESSORS -- DATA PROTECTION OFFICERS -- INTERNATIONAL TRANSFERS -- PROCESSING DATA OF EU DATA SUBJECTS -- BREACH NOTIFICATIONS -- SUMMARY |
|
8 IT IN THE WORKPLACE: PROTECTING THE EMPLOYER -- INTRODUCTION -- COMPUTER AND EMAIL USAGE POLICIES -- SOCIAL MEDIA -- SUMMARY -- 9 IT IN THE WORKPLACE: AVOIDING EMPLOYMENT PROBLEMS -- INTRODUCTION -- HEALTH AND SAFETY RESPONSIBILITIES -- EMPLOYMENT LAW -- FURTHER ADVICE -- SUMMARY -- 10 OPEN SOURCE SOFTWARE -- INTRODUCTION -- WHAT IS OPEN SOURCE? -- OPEN SOURCE AND COMMUNITIES -- OPEN SOURCE SOFTWARE BUSINESS MODELS -- BUSINESSES AS CUSTOMERS OF OPEN SOURCE -- OPEN SOURCE LICENSING IN GREATER DEPTH -- PROCURING ON-PREMISE OPEN SOURCE -- LICENSING REQUIREMENTS -- OPEN SOURCE IN THE SUPPLY CHAIN |
Summary |
This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the most relevant legal frameworks and gives examples from actual cases |
Notes |
Description based upon print version of record |
|
OPEN SOURCE COMPLIANCE POLICIES AND PROCEDURES |
Subject |
Computers -- Law and legislation.
|
|
Computers -- Law and legislation -- Great Britain
|
|
Information technology -- Law and legislation -- Great Britain
|
|
Computers -- Law and legislation
|
|
Information technology -- Law and legislation
|
|
Great Britain
|
Form |
Electronic book
|
Author |
Pierce, Jennifer
|
|
Smith, Stuart
|
|
Newton, Jeremy
|
|
Cordell, Nikki
|
|
De Silva, Sam
|
|
Ellacott, Sara
|
|
Hordern, Victoria
|
|
James, Stewart
|
|
Katz, Andrew
|
ISBN |
9781780174907 |
|
178017490X |
|