Show Summary Details
D DDOS threats, and 1.03 DNS poisoning threats, and 1.03 DVLA surveillance and monitoring, and 21.34 — 21.35 Dark Web managing security in an international institution, and 14.86 — 14.87 Data Protection Act 2018 background 3.79 breachless liability, and fines 22.64 Brexit, and 3.79 data security, and 16.37 — 16.39 extra-territorial jurisdiction 3.144 — 3.147 future developments 3.168 — 3.178 introduction 3.79 purpose 3.79 sentencing 3.148 — 3.167 structure 3.80 — 3.88 territorial scope 3.144 — 3.147 Data Protection Officer generally 3.35 Data Retention Regulations 2009 generally 3.92 Data Retention and Regulation of Investigatory Powers Act (DRIPA) 2014 background 3.92 — 3.95 generally 3.91 Data aggregation social media policy, and 11.13 — 11.15 Data architecture agile architecture 23.73 — 23.76 agile strategy 23.81 — 23.83 assuring data sources 23.54 attack vectors insider risk 23.11 — 23.13 introduction 23.06 ransomware 23.07 supply chain 23.08 — 23.10 automated interventions 23.55 — 23.56 ...
D
Cyber Security: Law and Guidance
- Author:
- Helen Wong
- Publisher:
- Bloomsbury Professional
- Edition:
- Second edition
- Publication Date:
- 2025
If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.