Show Summary Details

R

Cyber Security: Law and Guidance

Author:
Helen Wong
Publisher:
Bloomsbury Professional
Edition:
Second edition
Publication Date:
2025
R Ransomware conclusion 31.33 data architecture 23.07 healthcare organisations, and encryption of files 10.568 generally 10.567 infection method 10.569 operation 10.568 see also Wannacry spreading 10.569 ’kill switch’ 10.571 privacy, and 29.12 29.21 — 29.25 threats, and 1.03 Raytheon generally 10.487 — 10.490 see also Aerospace, defence and security sector Re-identification of personal data data breaches, and 19.94 Recall notices product security and telecommunications infrastructure, and 21.10 Record keeping data protection, and 3.33 Records management security checklist 22.100 generally 22.58 introduction 22.06 Referrals social media policy, and 11.43 — 11.47 Regulation of Investigatory Powers Act (RIPA) 2000 background 3.92 — 3.96 data security, and 16.67 — 16.71 generally 3.91 Remote access Trojan (RAT) threats, and 1.03 Remote workers cyber-attacks, and 20.42 — 20.48 workplace security and privacy, and 5.36 — 5.40 Remuneration of influencers social media policy, and 11.56 — 11.59 Renewables sector generally 10.399 — 10.404 see also Energy ...

If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.