Legal Issues Review: GDPR ComplianceGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652019-08-01T04:00:00Z<p>​Routledge; r<a href="" target="_blank"></a>; 212 pages; $39.95.</p><p>Cybersecurity professionals say there are two types of network operators—those who know there’s been a cybersecurity breach and those who have yet to discover there’s been a security breach. The question is not “if” but “when” the next network breach will occur. <br></p><p>The General Data Protection Regulation (GDPR) is a recent law intended to improve upon and better define the protection of personal data. It establishes fines for organizations that fail to maintain technical or organizational safeguards for protecting personal data. Primarily directed towards the European Union (EU) and European Economic Area (EEA) countries, it also impacts any international organization that exports, maintains, or collects EU privacy data outside the region. </p><p>Written to help those who manage data, <em><a href="" target="_blank">GDPR: How to Achieve and Maintain Compliance</a></em> provides clear and concise information in an easy-to-read format. Why should a non-European business care about EU privacy data? The answers are found throughout this book, which includes numerous references to articles and recitals in each chapter.  </p><p>Chapters cover GDPR principles, awareness, and information security best practices. The book provides the foundation necessary for establishing proper security protocols and offers clear and concise procedures for maintaining those protocols and achieving operational cybersecurity. </p><p>The authors have more than 90 <em>​</em>years of combined experience in complying with security requirements and thereby avoiding hefty penalties. Chief information officers, data pro­tection officers, and individuals that process or control EU privacy data would be prudent to review the information in this book and use it like a checklist to protect data in their possession, data-based systems, and potentially the reputation of the business.</p><p><em>Reviewer: Mark A. Terry, CPP, PCI, PSP, CISSP, is the security and protection manager for a U.S. Army Criminal Investigation HQ that encompasses the Western United States and Asia Pacific Rim. He is a member of the ASIS School Safety and Security Council and the Global Terrorism, Political Instability, and International Crime Council. He also serves as the Puget Sound Chapter’s secretary. </em></p>

Legal Issues Review: GDPR Compliance 2019 Legal Report Legal Report 2019 Legal Report 2019 Legal Report Regulator Issues First Major GDPR Violation Fine 2019 Legal Report Duty and Vulnerable Intoxication Issue 2018 Legal Report Report Resources November 2018 2018 Legal Report 2018 Legal Report Online October 2018 2018 Legal Report Resources 2018 Legal Report in the Academies Online September 2018 2018 Legal Report Resources VUELO

 You May Also Like... Online January 2018<h4>​SCHOOL SAFETY</h4><p>Campus security nonprofit <a href="" target="_blank">Safe Havens International </a>offers free school safety resources on its website that can be used in K-12 schools as well as for higher learning institutions. Documents include a <a href="" target="_blank">safety plan evaluation tool</a>, a building design checklist, and a sample background investigation booklet for the hiring process. Safe Havens International works with schools on national and international levels in planning, coordinating, and evaluating a wide range of school crisis simulations.</p><h4>​BIODEFENSE</h4><p>Despite a call for a united biodefense approach, U.S. federal agencies continue to face challenges in sharing threat information, according to <a href="" target="_blank">a GAO report​</a>. A <a href="" target="_blank">2016 panel on biodefense</a> contends that the U.S. vice president should lead the nation’s biodefense efforts.</p><h4>CYBER STRATEGY</h4><p>Despite awareness of cyber risks, many companies remain unprepared to deal with them, according to PricewaterhouseCoopers’ <a href="" target="_blank">The Global State of Information Security Survey 2018.​</a></p><h4>CRISIS COMMUNICATIONS</h4><p>SmartRiskSolutions GmbH <a href="" target="_blank">published a handbook​</a> with advice for crisis management and crisis communications during a terrorist attack or active shooter incident. </p><h4>ASIS ACCOLADES</h4><p>Attendees at the ASIS 2017 voted the Pelco by Schneider Electric VideoXpert Professional Video Management System an ASIS Accolades People’s Choice Award winner. The Judges Choice awardee was the intelligent security robot from Cobalt Robotics. <a href="" target="_blank">Read about all the winners.​</a></p><h4>WHISTLEBLOWING REWARDS</h4><p>Financial incentives can discourage whistleblower reporting, <a href="" target="_blank">according to a new study.​​</a></p><h4>FIRE SAFETY</h4><p>The <a href="" target="_blank">2016 Fire and Life Safety Study</a> from Consulting-Specifying Engineer surveyed its subscribers on what matters to them when selecting a fire and life safety system. ​</p><h4>EMAIL</h4><p>The U.S. Department of Homeland Security <a href="" target="_blank">issued a binding directive ​</a>that requires all U.S. agencies to adopt email and Web security guards against phishing and spam.</p><h4>BOMBING CONVICTION</h4><p><a href="" target="_blank">A jury convicted</a> Ahmad Khan Rahimi on eight charges related to bombings in New York City on September 17, 2016, which injured more than 30 people and caused millions of dollars in property damage.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465