Adhering to Compliance Laws
The past three to four decades have seen an explosion in computing power and in the number of ways computers are used. The increased reliance on networked resources, hardware, and software has created many new opportunities for the malicious use of resources. Information has become a valued asset to organizations and an attractive target of attackers. As information-related crime has grown, so has legislation and regulation to protect organizations and individuals from criminal activity.
Today’s organizations are increasingly subject to various laws enacted to protect the privacy of electronic information. Each organization must comply with laws and regulations, although the specific laws and regulations to which ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access