Safeguarding Critical E-Documents
- Length: 263 pages
- Edition: 1
- Language: English
- Publisher: Wiley
- Publication Date: 2012-07-31
- ISBN-10: 111815908X
- ISBN-13: 9781118159088
- Sales Rank: #2078260 (See Top 100 Books)
Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets
Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records
Managers and public officials are looking for technology and information governance solutions to “information leakage” in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.
- Provides practical, step-by-step guidance on protecting sensitive and confidential documents—even if they leave the organization electronically or on portable devices
- Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications
- Offers a concise format for securing your organizations from information leakage
In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization’s reputation and leading to costly investigations.
Table of Contents
Part I: The Problem and Basic Tools
Chapter 1: The Problem: Securing Confidential Electronic Documents
Chapter 2: Information Governance: The Crucial First Step
Part II: Information Platform Risks and Countermeasures
Chapter 3: Managing E-Documents and Records
Chapter 4: Information Governance and Security for E-mail Messages
Chapter 5: Information Governance and Security for Instant Messaging
Chapter 6: Information Governance and Security for Social Media
Chapter 7: Information Governance and Security for Mobile Devices
Chapter 8: Information Governance and Security for Cloud Computing Use
Part III: E-Records Considerations
Chapter 9: Information Governance and Security for Vital Records
Chapter 10: Long-Term Preservation of E-Records
Part IV: Information Technology Considerations
Chapter 11: Technologies That Can Help Secure E-Documents
Chapter 12: Safeguarding Confidential Information Assets
Part V: Rolling It Out: Project and Program Issues
Chapter 13: Building the Business Case to Justify the Program
Chapter 14: Securing Executive Sponsorship
Chapter 15: Safeguarding Confidential Information Assets: Where Do You Start?
Chapter 16: Procurement: The Buying Process
Chapter 17: Maintaining a Secure Environment for Information Assets
Appendix B: Regulations Related to Records Management