Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
IAPP CIPP / US certified information privacy professional study guide / Mike Chapple, Joe Shelley.
Author
Chapple, Mike
[Browse]
Format
Book
Language
English
Published/Created
Hoboken, New Jersey : John Wiley & Sons, Inc., [2021]
©2021
Description
1 online resource (308 pages)
Availability
Available Online
O'Reilly Online Learning: Academic/Public Library Edition
Details
Subject(s)
Privacy, Right of.
[Browse]
Data protection
—
Law and legislation
—
Examinations
—
Study guides
[Browse]
Author
Shelley, Joe
[Browse]
Source of description
Description based on print version record.
Contents
Cover
Title Page
Copyright Page
Acknowledgments
About the Authors
About the Technical Editors
Contents at a Glance
Contents
Introduction
The CIPP/US Exam
CIPP/US Exam Objectives
CIPP/US Certification Exam Objective Map
Assessment Test
Answers to Assessment Test
Chapter 1 Privacy in the Modern Era
Introduction to Privacy
What Is Privacy?
What Is Personal Information?
What Isn't Personal Information?
Why Should We Care About Privacy?
Generally Accepted Privacy Principles
Exam Note
Management
Notice
Choice and Consent
Collection
Use, Retention, and Disposal
Access
Disclosure to Third Parties
Security for Privacy
Quality
Monitoring and Enforcement
Developing a Privacy Program
Crafting Strategy, Goals, and Objectives
Appointing a Privacy Official
Privacy Roles
Building Inventories
Conducting a Privacy Assessment
Implementing Privacy Controls
Ongoing Operation and Monitoring
Online Privacy
Privacy Notices
Privacy and Cybersecurity
Cybersecurity Goals
Relationship Between Privacy and Cybersecurity
Privacy by Design
Summary
Exam Essentials
Review Questions
Chapter 2 Legal Environment
Branches of Government
Legislative Branch
Executive Branch
Judicial Branch
Understanding Laws
Sources of Law
Analyzing a Law
Legal Concepts
Legal Liability
Torts and Negligence
Chapter 3 Regulatory Enforcement
Federal Regulatory Authorities
Federal Trade Commission
Federal Communications Commission
Department of Commerce
Department of Health and Human Services
Banking Regulators
Department of Education
State Regulatory Authorities
International Regulatory Authorities
Self-Regulatory Programs
Payment Card Industry.
Advertising
Trust Marks
Safe Harbors
Chapter 4 Information Management
Data Governance
Building a Data Inventory
Data Classification
Data Flow Mapping
Data Lifecycle Management
Workforce Training
Cybersecurity Threats
Threat Actors
Incident Response
Phases of Incident Response
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-incident Activity
Building an Incident Response Plan
Data Breach Notification
Vendor Management
Vendor Cybersecurity Incidents
Chapter 5 Private Sector Data Collection
FTC Privacy Protection
General FTC Privacy Protection
The Children's Online Privacy Protection Act (COPPA)
Future of Federal Enforcement
Medical Privacy
The Health Insurance Portability and Accountability Act (HIPAA)
The Health Information Technology for Economic and Clinical Health Act
The 21st Century Cures Act
Confidentiality of Substance Use Disorder Patient Records Rule
Financial Privacy
Privacy in Credit Reporting
Gramm-Leach-Bliley Act (GLBA)
Red Flags Rule
Consumer Financial Protection Bureau
Educational Privacy
Family Educational Rights and Privacy Act (FERPA)
Telecommunications and Marketing Privacy
Telephone Consumer Protection Act (TCPA) and Telemarketing Sales Rule (TSR)
The Junk Fax Prevention Act (JFPA)
Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act
Telecommunications Act and Customer Proprietary Network Information
Cable Communications Policy Act
Video Privacy Protection Act (VPPA) of 1988
Chapter 6 Government and Court Access to Private Sector Information
Law Enforcement and Privacy
Access to Financial Data.
Access to Communications
National Security and Privacy
Foreign Intelligence Surveillance Act (FISA) of 1978
USA-PATRIOT Act
The USA Freedom Act of 2015
The Cybersecurity Information Sharing Act of 2015
Civil Litigation and Privacy
Compelled Disclosure of Media Information
Electronic Discovery
Chapter 7 Workplace Privacy
Introduction to Workplace Privacy
Workplace Privacy Concepts
U.S. Agencies Regulating Workplace Privacy Issues
U.S. Antidiscrimination Laws
Privacy Before, During, and After Employment
Employee Background Screening
Employee Monitoring
Investigation of Employee Misconduct
Termination of the Employment Relationship
Chapter 8 State Privacy Laws
Federal vs. State Authority
Financial Data
Credit History
California Financial Information Privacy Act
Data Security
Recent Developments
Data Breach Notification Laws
Elements of State Data Breach Notification Laws
Key Differences Among States Today
Marketing Laws
Chapter 9 International Privacy Regulation
International Data Transfers
European Union General Data Protection Regulation
Adequacy Decisions
U.S.-EU Safe Harbor and Privacy Shield
Binding Corporate Rules
Standard Contractual Clauses
Other Approved Transfer Mechanisms
APEC Privacy Framework
Cross-Border Enforcement Issues
Global Privacy Enforcement Network
Resolving Multinational Compliance Conflicts
Appendix: Answers to Review Questions
Chapter 1: Privacy in the Modern Era
Chapter 2: Legal Environment
Chapter 3: Regulatory Enforcement
Chapter 4: Information Management.
Chapter 5: Private Sector Data Collection
Chapter 6: Government and Court Access to Private Sector Information
Chapter 7: Workplace Privacy
Chapter 8: State Privacy Laws
Chapter 9: International Privacy Regulation
Index
Get Certified!
Comprehensive Online Learning Environment
EULA.
Show 174 more Contents items
ISBN
1-119-75761-4
1-119-75551-4
OCLC
1256260699
Statement on responsible collection description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Supplementary Information