0%

Book Description

Optimise your Web 2.0 and Social networking efforts, whilst managing risk and information security ... this essential guide will show you how!

Table of Contents

  1. Copyright
  2. Foreword
  3. 1. Web 2.0
    1. The benefits of Web 2.0 technologies
    2. Risks associated with Web 2.0 technologies
    3. The exponential growth of Web-based personal data
    4. Legislative lag
  4. 2. The Threat Landscape
  5. 3. Making Web 2.0 Sites Secure
    1. Ajax security issues
    2. Secure Web development
    3. Protecting users and companies from user entered content
    4. Internet good practice
    5. Filtering
  6. 4. Ensuring Web 2.0 Sites are Compliant
    1. UK
    2. US
    3. Europe
    4. Canada
    5. Copyright and Intellectual property infringement
    6. PCI
    7. Protection against breach of confidentiality and reputation damage
    8. Privacy
      1. UK
      2. US
      3. Canada
      4. Australia
    9. Processing of personal data – data protection and data breach notification
      1. Europe
      2. US
      3. UK
      4. What is personal data?
        1. Social networking profiles
        2. IP addresses
  7. 5. Summary of Recommendations
  8. 6. Conclusion
  9. Appendix: Glossary
  10. ITG Resources
    1. Pocket Guides
    2. Toolkits
    3. Best Practice Reports
    4. Training and Consultancy
    5. Newsletter
3.136.26.20