The E-Privacy imperative : protect your customers' Internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt.
Material type: TextPublication details: New York : AMACOM, c2002.Description: xi, 267 p. : ill. ; 23 cmISBN:- 0814406289
- 658.872 MER
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Standard Loan | Moylish Library Main Collection | 658.872 MER (Browse shelf(Opens below)) | 1 | Available | 39002000205014 |
Enhanced descriptions from Syndetics:
The E-Privacy Imperative is especially designed to help Web site owners and operators protect themselves, their customers, and their businesses through careful technology practices and responsible information handling. Readers will:
-- Understand the key arguments of privacy advocates, including major threats to privacy and federal regulations concerning privacy.
-- Learn to avoid both purposeful and accidental or negligent invasions of privacy.
-- Communicate security and privacy policies to customers and potential customers -- to assuage their fears and keep them coming back for more.
Includes bibliographical references (p. 243-249) and index.
Table of contents provided by Syndetics
- Acknowledgments (p. ix)
- Part 1 E-Privacy Is a Business Priority (p. 1)
- Chapter 1 Consumer Privacy (p. 3)
- Customer Concerns (p. 4)
- Self-Reliance or Government Regulation? A Question as Old as the Country (p. 5)
- The FTC and Online Privacy (p. 7)
- Fair Information Practices in the Electronic Marketplace (p. 12)
- Opting for Self-Regulation (p. 18)
- A Diagnostic for Privacy Controls (p. 21)
- Why Privacy Policies Should Matter (p. 23)
- Privacy Under Attack (p. 24)
- Cookies (p. 30)
- Reversing the Trends (p. 31)
- Customer Expectations (p. 33)
- Chapter 2 Business-to-Business and Electronic Marketplace Privacy and Security Concerns (p. 35)
- Serpents in the Garden of Efficiencies (p. 39)
- Are You Compliant? (p. 43)
- FTC Warning Signs (p. 44)
- E-Market Operating Standards (p. 45)
- Chapter 3 Workplace Matters (p. 51)
- What Are Employers Doing? (p. 54)
- "Do's" and "Don'ts" (p. 62)
- Is Federal Action Required? (p. 64)
- Big Brother Is Seemingly Alive and Well (p. 65)
- Chapter 4 Privacy Knows No Borders (p. 67)
- The European Directive on Privacy Policy (p. 68)
- The Gathering Storm Clouds (p. 76)
- The Safe Harbor Privacy Principles (p. 78)
- Is Everybody Happy? (p. 82)
- The Policy Heard 'Round the World (p. 83)
- Chapter 5 The Imperative of Privacy Policies (p. 85)
- What Constitutes a Good Privacy Policy? (p. 87)
- Where Do I Place My Privacy Policy? (p. 101)
- How Do I Create My Privacy Policy? (p. 103)
- The Future of Privacy Policies (p. 111)
- Part 2 Tools to Build Customer Confidence (p. 113)
- Chapter 6 Platform for Privacy Preferences (p. 115)
- P3P and the W3C (p. 115)
- How P3P Works (p. 118)
- P3P Implementation Checklist (p. 131)
- Chapter 7 Server-Based Security Countermeasures (p. 133)
- Dimensions of Logical Access Control (p. 134)
- Web Server Security (p. 135)
- CGI Scripts and Active Server Pages (p. 143)
- Software Vulnerabilities (p. 145)
- An E-Commerce Security Architecture (p. 147)
- More Controls at the Server (p. 152)
- Global Secure E-Commerce (p. 153)
- Protect Yourself From Yourself (p. 157)
- "Securing Your Servers" Checklist (p. 157)
- Chapter 8 Hands in the Cookie Jar (p. 159)
- If Cookies Aren't for Eating, What Are They For? (p. 162)
- The IDcide Privacy Companion (p. 171)
- The Final Word on Cookies? (p. 174)
- Countering Cookie Crumblers (p. 174)
- Chapter 9 Third-Party Seals of Privacy Assurance (p. 177)
- What Is a Seal Program? (p. 177)
- Why Is Independent Certification Needed? (p. 178)
- How Seals Are Obtained (p. 180)
- Are Seals for Everyone? (p. 191)
- Confidence Breeds Confidence (p. 192)
- Third-Party Seals of Privacy Assurance Checklist (p. 193)
- Chapter 10 Keeping Your Policies Up to Date (p. 195)
- The Privacy Promise Member Compliance Guide (p. 197)
- What Happens If a DMA Member Does Not Follow the Privacy Promise? (p. 201)
- Step into Your Customers' Shoes (p. 203)
- The Frontier of Privacy (p. 209)
- Banking Privacy Laws Take Effect (p. 210)
- Health Insurance Portability and Accountability Act (p. 210)
- Chief Privacy Officers on the Scene (p. 212)
- New Frontiers, New Problems (p. 215)
- Appendixes (p. 217)
- Appendix A FTC Privacy Policy Development Guidelines (p. 219)
- Appendix B TRUSTe Model Privacy Statement (p. 223)
- Sample Privacy Policy (p. 224)
- Appendix C Privacy Advocates (p. 233)
- Privacy Organizations (p. 234)
- Security Advisories (p. 240)
- Appendix D Suggested Readings (p. 243)
- Appendix E Glossary of E-Privacy Terms (p. 251)
- Index (p. 259)