000 | 03123nam a22004935i 4500 | ||
---|---|---|---|
001 | 978-1-4471-5586-7 | ||
003 | DE-He213 | ||
005 | 20200421112224.0 | ||
007 | cr nn 008mamaa | ||
008 | 131015s2013 xxk| s |||| 0|eng d | ||
020 |
_a9781447155867 _9978-1-4471-5586-7 |
||
024 | 7 |
_a10.1007/978-1-4471-5586-7 _2doi |
|
050 | 4 | _aQA76.9.C66 | |
072 | 7 |
_aUBJ _2bicssc |
|
072 | 7 |
_aCOM079000 _2bisacsh |
|
082 | 0 | 4 |
_a004 _223 |
100 | 1 |
_aWong, Rebecca. _eauthor. |
|
245 | 1 | 0 |
_aData Security Breaches and Privacy in Europe _h[electronic resource] / _cby Rebecca Wong. |
264 | 1 |
_aLondon : _bSpringer London : _bImprint: Springer, _c2013. |
|
300 |
_aVII, 54 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
505 | 0 | _aForeword -- Introduction -- Data Protection Directive 95/46/EC -- The Amended Directive on Privacy and Electronic Communications -- Art. 29 Working Party: Future of Privacy -- European Commission Communication Opinion 2010 -- Proposed Data Protection Regulation 2012: Data Security Breach Notifications -- Framework Decision 2005/222/JHA and the Directive against Information Systems -- European Data Protection Supervisor's Opinion on Cybersecurity -- Cybersecurity Directive 2013 -- Criticism of the Cybersecurity Directive -- Concluding Remarks. . | |
520 | _aData Security Breaches and Privacy in Europe aims to consider data protection and cybersecurity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection framework to protect against data security breaches and considers what more needs to be achieved. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aInternational law. | |
650 | 0 |
_aIntellectual property _xLaw and legislation. |
|
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aInternational IT and Media Law, Intellectual Property Law. |
650 | 2 | 4 | _aCriminology and Criminal Justice, general. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9781447155850 |
830 | 0 |
_aSpringerBriefs in Cybersecurity, _x2193-973X |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-1-4471-5586-7 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c57598 _d57598 |