Mark S. Merkow CCP, James Breithaupt0814406289, 9780814406281
Table of contents :
The E-Privacy Imperative……Page 4
Contents……Page 6
Acknowledgments……Page 10
PART 1 E-Privacy Is a Business Priority……Page 14
CHAPTER 1 Consumer Privacy……Page 16
Customer Concerns……Page 17
A Question as Old as the Country……Page 18
The FTC and Online Privacy……Page 20
Electronic Marketplace……Page 25
Opting for Self- Regulation……Page 31
A Diagnostic for Privacy Controls……Page 34
Why Privacy Policies Should Matter……Page 36
PCSpy2000……Page 37
Cookies……Page 43
DoubleClick on the Hot Seat……Page 44
Even Bankruptcy May Not Protect You……Page 45
Customer Expectations……Page 46
CHAPTER 2 Business-to-Business and Electronic Marketplace Privacy and Security Concerns……Page 48
Serpents in the Garden of Efficiencies……Page 52
What’s a Monopsony?……Page 53
for Collaborations Among Competitors……Page 55
Are You Compliant?……Page 56
FTC Warning Signs……Page 57
E- Market Operating Standards……Page 58
Product Profile: IBM XML Security Suite……Page 61
CHAPTER 3 Workplace Matters……Page 64
What Are Employers Doing?……Page 67
“Do’s” and “Don’ts”……Page 75
Is Federal Action Required?……Page 77
Big Brother Is Seemingly Alive and Well……Page 78
CHAPTER 4 Privacy Knows No Borders……Page 80
The European Directive on Privacy Policy……Page 81
The Gathering Storm Clouds……Page 89
The Safe Harbor Privacy Principles……Page 91
Is Everybody Happy?……Page 95
The Policy Heard ‘Round the World……Page 96
CHAPTER 5 The Imperative of Privacy Policies……Page 98
What Constitutes a Good Privacy Policy?……Page 100
Where Do I Place My Privacy Policy?……Page 114
How Do I Create My Privacy Policy?……Page 116
The Future of Privacy Policies……Page 124
PART 2 Tools to Build Customer Confidence……Page 126
P3P and the W3C……Page 128
How P3P Works……Page 131
P3P Implementation Checklist……Page 144
CHAPTER 7 Server-Based Security Countermeasures……Page 146
Dimensions of Logical Access Control……Page 147
Web Server Security……Page 148
CGI Scripts and Active Server Pages……Page 156
Software Vulnerabilities……Page 158
An E- Commerce Security Architecture……Page 160
More Controls at the Server……Page 165
Global Secure E- Commerce……Page 166
“Securing Your Servers” Checklist……Page 170
CHAPTER 8 Hands in the Cookie Jar……Page 172
What Are They For?……Page 175
The IDcide Privacy Companion……Page 184
Countering Cookie Crumblers……Page 187
What Is a Seal Program?……Page 190
Why Is Independent Certification Needed?……Page 191
How Seals Are Obtained……Page 193
Are Seals for Everyone?……Page 204
Confidence Breeds Confidence……Page 205
Assurance Checklist……Page 206
CHAPTER 10 Keeping Your Policies Up to Date……Page 208
Compliance Guide……Page 210
Not Follow the Privacy Promise?……Page 214
Step into Your Customers’ Shoes……Page 216
The Frontier of Privacy……Page 222
Accountability Act……Page 223
Chief Privacy Officers on the Scene……Page 225
New Frontiers, New Problems……Page 228
APPENDIXES……Page 230
APPENDIXES A: FTC Privacy Policy Development Guidelines……Page 232
APPENDIXES B: TRUSTe Model Privacy Statement……Page 236
Sample Privacy Policy……Page 237
APPENDIXES C: Privacy Advocates……Page 246
Privacy Organizations……Page 247
Security Advisories……Page 253
APPENDIXES D: Suggested Readings……Page 256
APPENDIXES E: Glossary of E-Privacy Terms……Page 264
Reviews
There are no reviews yet.