Excerpt from A Methodology for Evaluating Alternative Technical and Information Management Approaches to Privacy Requirements
Requirement 2, Accounting for Data Disclosures 21 Requirement 3, Access to Records 26 Requirement 4, General Agency Requirements 30 Appendix 1 Glossary of fortran Variables 39.
About the Publisher
Forgotten Books publishes hundreds of thousands of rare and classic books. Find more at www.forgottenbooks.com
This book is a reproduction of an important historical work. Forgotten Books uses state-of-the-art technology to digitally reconstruct the work, preserving the original format whilst repairing imperfections present in the aged copy. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in our edition. We do, however, repair the vast majority of imperfections successfully; any imperfections that remain are intentionally left to preserve the state of such historical works.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
EUR 1,91 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiDa: PBShop.store US, Wood Dale, IL, U.S.A.
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo LW-9780260563996
Quantità: 15 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo LW-9780260563996
Quantità: 15 disponibili
Da: Forgotten Books, London, Regno Unito
Paperback. Condizione: New. Print on Demand. This book presents a structured approach to evaluate the costs and technical requirements for implementing the Privacy Act of 1974. Created in response to growing concerns about the misuse of personal information, this legislation set strict guidelines for the collection, use, and disclosure of personal data by federal agencies. The author reduces the act's requirements to 17 compliance steps and breaks each step down into specific actions required by the record keeper. These actions are then translated into resource expenditures, using a set of algorithms collectively called a privacy model and implemented as a computer program. The program produces printouts showing the consequences of input data, along with a total cost for conversion and an annual operating cost. This book provides a concrete and rigorous approach to privacy safeguards, and its insights into the act's requirements are significant. This book is a reproduction of an important historical work, digitally reconstructed using state-of-the-art technology to preserve the original format. In rare cases, an imperfection in the original, such as a blemish or missing page, may be replicated in the book. print-on-demand item. Codice articolo 9780260563996_0
Quantità: Più di 20 disponibili