Limit search to available items
Book Cover
E-book
Author Holt, Jeremy

Title A Practical Guide to IT Law
Edition 3rd ed
Published Swindon : BCS Learning & Development Limited, 2020

Copies

Description 1 online resource (264 p.)
Contents Cover -- Copyright Page -- CONTENTS -- LIST OF FIGURES AND TABLES -- CONTRIBUTORS -- ACKNOWLEDGEMENTS -- ABBREVIATIONS -- FOREWORD TO THE 3RD EDITION -- 1 IT CONTRACTS -- INTRODUCTION -- PARTS OF A CONTRACT -- WHO ARE YOU GOING TO CALL? -- CHECKING OUT THE SUPPLIER -- LETTER OF INTENT -- THE SUPPLIER'S TERMS -- WHAT CONTRACTS ARE THERE LIKELY TO BE? -- APPENDIX: MAIN POINTS OF AN IT CONTRACT -- 2 CLOUD COMPUTING -- INTRODUCTION -- WHAT IS CLOUD COMPUTING? -- THE EVOLUTION OF CLOUD COMPUTING -- FACTORS THAT CONTRIBUTED TO THE RISE OF CLOUD SERVICES -- CLOUD FORMATIONS -- SILVER LININGS
THUNDER CLOUDS -- SUMMARY -- REFERENCES -- 3 CLOUD COMPUTING CONTRACTS -- INTRODUCTION -- PRE-CONTRACTUAL STEPS -- KEY COMMERCIAL AND LEGAL ISSUES -- SUMMARY -- 4 INTELLECTUAL PROPERTY LAW FOR COMPUTER USERS -- INTRODUCTION -- HARDWARE AND INTELLECTUAL PROPERTY RIGHTS -- SOFTWARE AND INTELLECTUAL PROPERTY RIGHTS -- DATABASES AND INTELLECTUAL PROPERTY RIGHTS -- WEBSITES AND INTELLECTUAL PROPERTY RIGHTS -- DOMAIN NAMES AND INTELLECTUAL PROPERTY RIGHTS -- THE INTERNET AND TRADE MARKS -- THE INTERNET AND COPYRIGHT AND DATABASE RIGHT
APPENDIX: A BASIC GUIDE TO INTELLECTUAL PROPERTY AND RELATED RIGHTS -- TAKING ADVICE -- SUMMARY -- 5 CYBER SECURITY -- INTRODUCTION -- WHAT IS CYBER SECURITY? -- WHAT ARE THE MAIN FORMS OF CYBER ATTACK? -- WHAT ARE THE RISK AREAS? -- WHAT LAWS GOVERN CYBER SECURITY? -- WHAT PRACTICAL STEPS SHOULD YOU CONSIDER? -- WHAT GUIDES, FRAMEWORKS AND STANDARDS ARE AVAILABLE? -- SUMMARY -- REFERENCES -- 6 GDPR AND DATA PROTECTION: THE LAW -- INTRODUCTION -- WHAT DATA ARE COVERED? -- SPECIAL CATEGORIES OF PERSONAL DATA -- DATA PROTECTION PRINCIPLES -- RIGHTS OF INDIVIDUALS -- EXEMPTIONS
REMEDIES, ENFORCEMENT POWERS AND PENALTIES -- SUMMARY -- 7 DATA PROTECTION IN PRACTICE -- INTRODUCTION -- DATA PROTECTION BY DESIGN AND DEFAULT -- WHAT AMOUNTS TO 'PROCESSING PERSONAL DATA' UNDER THE GDPR? -- CREATING A 'RECORD OF PROCESSING' -- DECIDING UPON THE LAWFUL BASIS OF PROCESSING -- DRAFTING DATA PROTECTION POLICIES -- DATA PROTECTION IMPACT ASSESSMENTS -- REQUESTS FROM DATA SUBJECTS -- CHILDREN'S PERSONAL DATA -- CONTROLLERS AND PROCESSORS -- SUB-PROCESSORS -- DATA PROTECTION OFFICERS -- INTERNATIONAL TRANSFERS -- PROCESSING DATA OF EU DATA SUBJECTS -- BREACH NOTIFICATIONS -- SUMMARY
8 IT IN THE WORKPLACE: PROTECTING THE EMPLOYER -- INTRODUCTION -- COMPUTER AND EMAIL USAGE POLICIES -- SOCIAL MEDIA -- SUMMARY -- 9 IT IN THE WORKPLACE: AVOIDING EMPLOYMENT PROBLEMS -- INTRODUCTION -- HEALTH AND SAFETY RESPONSIBILITIES -- EMPLOYMENT LAW -- FURTHER ADVICE -- SUMMARY -- 10 OPEN SOURCE SOFTWARE -- INTRODUCTION -- WHAT IS OPEN SOURCE? -- OPEN SOURCE AND COMMUNITIES -- OPEN SOURCE SOFTWARE BUSINESS MODELS -- BUSINESSES AS CUSTOMERS OF OPEN SOURCE -- OPEN SOURCE LICENSING IN GREATER DEPTH -- PROCURING ON-PREMISE OPEN SOURCE -- LICENSING REQUIREMENTS -- OPEN SOURCE IN THE SUPPLY CHAIN
Summary This comprehensive guide for management professionals discusses the IT-related legal issues faced by businesses on a daily basis. Legal concepts and terminology are notoriously difficult for non-specialists, but this book explains in plain English the most relevant legal frameworks and gives examples from actual cases
Notes Description based upon print version of record
OPEN SOURCE COMPLIANCE POLICIES AND PROCEDURES
Subject Computers -- Law and legislation.
Computers -- Law and legislation -- Great Britain
Information technology -- Law and legislation -- Great Britain
Computers -- Law and legislation
Information technology -- Law and legislation
Great Britain
Form Electronic book
Author Pierce, Jennifer
Smith, Stuart
Newton, Jeremy
Cordell, Nikki
De Silva, Sam
Ellacott, Sara
Hordern, Victoria
James, Stewart
Katz, Andrew
ISBN 9781780174907
178017490X