Chapter 1: Data breaches defined Chapter 2: Impact of a data breach Chapter 3: Data breach preparedness Chapter 4: Identifying a data breach Chapter 5: Managing notification: Who do you tell and when? Chapter 6: Investigating a suspected breach Chapter 7: Narrowly scoping confirmed breaches
Note: Description based on CIP data; item not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.