Building Effective Privacy Programs: Cybersecurity from Principles to Practice

Author:   Jason Edwards (Birkbeck, University of London, UK) ,  Griffin Weaver (University of Utah; Brigham Young University)
Publisher:   John Wiley & Sons Inc
ISBN:  

9781394342631


Pages:   448
Publication Date:   02 October 2025
Format:   Hardback
Availability:   Awaiting stock   Availability explained


Our Price $168.95 Quantity:  
Pre-Order

Share |

Building Effective Privacy Programs: Cybersecurity from Principles to Practice


Overview

Presents a structured approach to privacy management, an indispensable resource for safeguarding data in an ever-evolving digital landscape In today’s data-driven world, protecting personal information has become a critical priority for organizations of all sizes. Building Effective Privacy Programs: Cybersecurity from Principles to Practice equips professionals with the tools and knowledge to design, implement, and sustain robust privacy programs. Seamlessly integrating foundational principles, advanced privacy concepts, and actionable strategies, this practical guide serves as a detailed roadmap for navigating the complex landscape of data privacy. Bridging the gap between theoretical concepts and practical implementation, Building Effective Privacy Programs combines in-depth analysis with practical insights, offering step-by-step instructions on building privacy-by-design frameworks, conducting privacy impact assessments, and managing compliance with global regulations. In-depth chapters feature real-world case studies and examples that illustrate the application of privacy practices in a variety of scenarios, complemented by discussions of emerging trends such as artificial intelligence, blockchain, IoT, and more. Providing timely and comprehensive coverage of privacy principles, regulatory compliance, and actionable strategies, Building Effective Privacy Programs: Addresses all essential areas of cyberprivacy, from foundational principles to advanced topics Presents detailed analysis of major laws, such as GDPR, CCPA, and HIPAA, and their practical implications Offers strategies to integrate privacy principles into business processes and IT systems Covers industry-specific applications for healthcare, finance, and technology sectors Highlights successful privacy program implementations and lessons learned from enforcement actions Includes glossaries, comparison charts, sample policies, and additional resources for quick reference Written by seasoned professionals with deep expertise in privacy law, cybersecurity, and data protection, Building Effective Privacy Programs: Cybersecurity from Principles to Practice is a vital reference for privacy officers, legal advisors, IT professionals, and business executives responsible for data governance and regulatory compliance. It is also an excellent textbook for advanced courses in cybersecurity, information systems, business law, and business management.

Full Product Details

Author:   Jason Edwards (Birkbeck, University of London, UK) ,  Griffin Weaver (University of Utah; Brigham Young University)
Publisher:   John Wiley & Sons Inc
Imprint:   John Wiley & Sons Inc
Dimensions:   Width: 22.30cm , Height: 3.20cm , Length: 28.20cm
Weight:   1.461kg
ISBN:  

9781394342631


ISBN 10:   1394342632
Pages:   448
Publication Date:   02 October 2025
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Forthcoming
Availability:   Awaiting stock   Availability explained

Table of Contents

Table of contents Preface Chapter 1 - Introduction to Privacy    Definition and Importance of Privacy            Historical Perspective on Privacy       Modern Privacy Challenges    Recommendations      Chapter Conclusion Questions        Chapter 2 - Understanding Personal Data      Definition and Types of Personal Data          Sensitive Personal Data          Data Combinations and Anonymization         Recommendations      Chapter Conclusion Questions   Chapter 3 - Data Processing    Definition and Types of Processing    Legal Bases for Processing     Data Processing Principles      Recommendations      Chapter Conclusion Questions               Chapter 4 - Roles and Relationships   Data Controller vs. Data Processor     Sub-Processors            Data Subjects and Their Rights          Recommendations      Chapter Conclusion Questions     Chapter 5 - Privacy Impact Assessments (PIA)         Purpose and Benefits of PIA  Conducting a Privacy Impact Assessment (PIA)       Importance of Stakeholder Involvement        PIA Templates and Examples Recommendations      Chapter Conclusion Questions     Chapter 6 - Roles in Privacy Leadership        Chief Privacy Officer (CPO)  Chief Information Security Officer (CISO)   Data Protection Officer (DPO)           Privacy Champions     Privacy Engineers       Recommendations      Chapter Conclusion Questions               Chapter 7 - Data Subject Rights (DSR)          Data Subject Rights (DSR)     Handling Data Subject Requests        DSR Tools and Techniques    Recommendations      Chapter Conclusion Questions               Chapter 8 - Privacy Frameworks and Standards        NIST Privacy Framework: Mapping Organizational Practices to the Framework    ISO/IEC 27701           Other Notable Frameworks: GDPR, CCPA, PIPL, and LGPD         Recommendations      Chapter Conclusion Questions               Chapter 9 - Major Privacy Laws and Regulations      Major Privacy Laws and Regulations California Consumer Privacy Act (CCPA)    Health Insurance Portability and Accountability Act (HIPAA)        Comparative Analysis of Global Regulations            Recommendations      Chapter Conclusion Questions               Chapter 10 - International Privacy Concerns Cross-Border Data Transfers Adequacy Decisions Binding Corporate Rules and Standard Contractual Clauses Recommendations Chapter Conclusion Questions     Chapter 11 - Regulatory Enforcement Role of Data Protection Authorities International Cooperation Between Authorities Guidance on Emerging Issues Enforcement Actions and Penalties High-Profile Cases and Their Implications Appeals and Legal Remedies Case Studies of Regulatory Actions Recommendations Chapter Conclusion Questions     Chapter 12 - Privacy by Design and Default Principles of Privacy by Design Embedding Privacy in Organizational Culture Lifecycle Management of Personal Data User-Centric Privacy Controls Implementing Privacy by Default Case Studies and Best Practices Recommendations Chapter Conclusion Questions     Chapter 13 - Privacy Technology and Tools  Privacy Enhancing Technologies (PETs): Anonymization vs. Pseudonymization    Data Masking and Encryption            Privacy Management Software          Recommendations      Chapter Conclusion Questions     Chapter 14 - Data Breach Management         Identifying and Responding to Data Breaches           Notification Requirements      Post-Breach Remediation       Recommendations      Chapter Conclusion Questions     Chapter 15 - Emerging Privacy Trends          Artificial Intelligence and Privacy      Internet of Things (IoT) and Privacy  Blockchain and Privacy          Recommendations      Chapter Conclusion Questions               Chapter 16 - Privacy Program Implementation          Establishing a Privacy Governance Structure Developing Privacy Policies and Procedures Implementing Privacy Controls and Measures           Monitoring and Reporting on Privacy Compliance    Continuous Improvement of the Privacy Program     Recommendations      Chapter Conclusion Questions     Chapter 17 - Privacy Training and Awareness           Developing Effective Privacy Training Programs      Engaging Employees in Privacy Awareness  Training Tools and Resources            Sample Annual Privacy Training Plan           Recommendations      Chapter Conclusion Questions     Chapter 18 - Privacy Audits & Assessments  Privacy Audits and Assessments        Using Assessment Tools         Integrating Assessments with Risk Management       Reporting and Follow-Up Actions     Recommendations      Chapter Conclusion Questions     Answers Index

Reviews

Author Information

Jason Edwards, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and popular on LinkedIn. Griffin Weaver is the Managing Legal Director (Privacy, Cybersecurity, and Technology) at Dell Technologies. He holds a Juris Doctorate and is a Fellow of Information Privacy (FIP). Weaver specializes in digital law, privacy governance, and cybersecurity policy. He is a sought-after speaker and educator who has taught privacy and cybersecurity law at leading institutions, regularly contributes to industry publications, and presents at global conferences on privacy, data protection, and digital rights.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

SEPRG2025

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List