gogogo
Syndetics cover image
Image from Syndetics

The E-Privacy imperative : protect your customers' Internet privacy and ensure your company's survival in the electronic age / Mark S. Merkow, James Breithaupt.

By: Contributor(s): Material type: TextTextPublication details: New York : AMACOM, c2002.Description: xi, 267 p. : ill. ; 23 cmISBN:
  • 0814406289
Subject(s): DDC classification:
  • 658.872 MER
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 658.872 MER (Browse shelf(Opens below)) 1 Available 39002000205014

Enhanced descriptions from Syndetics:

The E-Privacy Imperative is especially designed to help Web site owners and operators protect themselves, their customers, and their businesses through careful technology practices and responsible information handling. Readers will:
-- Understand the key arguments of privacy advocates, including major threats to privacy and federal regulations concerning privacy.
-- Learn to avoid both purposeful and accidental or negligent invasions of privacy.
-- Communicate security and privacy policies to customers and potential customers -- to assuage their fears and keep them coming back for more.

Includes bibliographical references (p. 243-249) and index.

Table of contents provided by Syndetics

  • Acknowledgments (p. ix)
  • Part 1 E-Privacy Is a Business Priority (p. 1)
  • Chapter 1 Consumer Privacy (p. 3)
  • Customer Concerns (p. 4)
  • Self-Reliance or Government Regulation? A Question as Old as the Country (p. 5)
  • The FTC and Online Privacy (p. 7)
  • Fair Information Practices in the Electronic Marketplace (p. 12)
  • Opting for Self-Regulation (p. 18)
  • A Diagnostic for Privacy Controls (p. 21)
  • Why Privacy Policies Should Matter (p. 23)
  • Privacy Under Attack (p. 24)
  • Cookies (p. 30)
  • Reversing the Trends (p. 31)
  • Customer Expectations (p. 33)
  • Chapter 2 Business-to-Business and Electronic Marketplace Privacy and Security Concerns (p. 35)
  • Serpents in the Garden of Efficiencies (p. 39)
  • Are You Compliant? (p. 43)
  • FTC Warning Signs (p. 44)
  • E-Market Operating Standards (p. 45)
  • Chapter 3 Workplace Matters (p. 51)
  • What Are Employers Doing? (p. 54)
  • "Do's" and "Don'ts" (p. 62)
  • Is Federal Action Required? (p. 64)
  • Big Brother Is Seemingly Alive and Well (p. 65)
  • Chapter 4 Privacy Knows No Borders (p. 67)
  • The European Directive on Privacy Policy (p. 68)
  • The Gathering Storm Clouds (p. 76)
  • The Safe Harbor Privacy Principles (p. 78)
  • Is Everybody Happy? (p. 82)
  • The Policy Heard 'Round the World (p. 83)
  • Chapter 5 The Imperative of Privacy Policies (p. 85)
  • What Constitutes a Good Privacy Policy? (p. 87)
  • Where Do I Place My Privacy Policy? (p. 101)
  • How Do I Create My Privacy Policy? (p. 103)
  • The Future of Privacy Policies (p. 111)
  • Part 2 Tools to Build Customer Confidence (p. 113)
  • Chapter 6 Platform for Privacy Preferences (p. 115)
  • P3P and the W3C (p. 115)
  • How P3P Works (p. 118)
  • P3P Implementation Checklist (p. 131)
  • Chapter 7 Server-Based Security Countermeasures (p. 133)
  • Dimensions of Logical Access Control (p. 134)
  • Web Server Security (p. 135)
  • CGI Scripts and Active Server Pages (p. 143)
  • Software Vulnerabilities (p. 145)
  • An E-Commerce Security Architecture (p. 147)
  • More Controls at the Server (p. 152)
  • Global Secure E-Commerce (p. 153)
  • Protect Yourself From Yourself (p. 157)
  • "Securing Your Servers" Checklist (p. 157)
  • Chapter 8 Hands in the Cookie Jar (p. 159)
  • If Cookies Aren't for Eating, What Are They For? (p. 162)
  • The IDcide Privacy Companion (p. 171)
  • The Final Word on Cookies? (p. 174)
  • Countering Cookie Crumblers (p. 174)
  • Chapter 9 Third-Party Seals of Privacy Assurance (p. 177)
  • What Is a Seal Program? (p. 177)
  • Why Is Independent Certification Needed? (p. 178)
  • How Seals Are Obtained (p. 180)
  • Are Seals for Everyone? (p. 191)
  • Confidence Breeds Confidence (p. 192)
  • Third-Party Seals of Privacy Assurance Checklist (p. 193)
  • Chapter 10 Keeping Your Policies Up to Date (p. 195)
  • The Privacy Promise Member Compliance Guide (p. 197)
  • What Happens If a DMA Member Does Not Follow the Privacy Promise? (p. 201)
  • Step into Your Customers' Shoes (p. 203)
  • The Frontier of Privacy (p. 209)
  • Banking Privacy Laws Take Effect (p. 210)
  • Health Insurance Portability and Accountability Act (p. 210)
  • Chief Privacy Officers on the Scene (p. 212)
  • New Frontiers, New Problems (p. 215)
  • Appendixes (p. 217)
  • Appendix A FTC Privacy Policy Development Guidelines (p. 219)
  • Appendix B TRUSTe Model Privacy Statement (p. 223)
  • Sample Privacy Policy (p. 224)
  • Appendix C Privacy Advocates (p. 233)
  • Privacy Organizations (p. 234)
  • Security Advisories (p. 240)
  • Appendix D Suggested Readings (p. 243)
  • Appendix E Glossary of E-Privacy Terms (p. 251)
  • Index (p. 259)

Powered by Koha