Excerpt from A Methodology for Evaluating Alternative Technical and Information Management Approaches to Privacy Requirements
Requirement 2, Accounting for Data Disclosures 21 Requirement 3, Access to Records 26 Requirement 4, General Agency Requirements 30 Appendix 1 Glossary of fortran Variables 39.
About the Publisher
Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.
"Sinopsis" puede pertenecer a otra edición de este libro.
EUR 0,73 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: PBShop.store US, Wood Dale, IL, Estados Unidos de America
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: LW-9780260563996
Cantidad disponible: 15 disponibles
Librería: PBShop.store UK, Fairford, GLOS, Reino Unido
PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: LW-9780260563996
Cantidad disponible: 15 disponibles
Librería: Forgotten Books, London, Reino Unido
Paperback. Condición: New. Print on Demand. This book presents a structured approach to evaluate the costs and technical requirements for implementing the Privacy Act of 1974. Created in response to growing concerns about the misuse of personal information, this legislation set strict guidelines for the collection, use, and disclosure of personal data by federal agencies. The author reduces the act's requirements to 17 compliance steps and breaks each step down into specific actions required by the record keeper. These actions are then translated into resource expenditures, using a set of algorithms collectively called a privacy model and implemented as a computer program. The program produces printouts showing the consequences of input data, along with a total cost for conversion and an annual operating cost. This book provides a concrete and rigorous approach to privacy safeguards, and its insights into the act's requirements are significant. This book is a reproduction of an important historical work, digitally reconstructed using state-of-the-art technology to preserve the original format. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in the book. print-on-demand item. Nº de ref. del artículo: 9780260563996_0
Cantidad disponible: Más de 20 disponibles