Main topic: Disaster recovery, protection of privacy.
6 / INTERVIEW WITH KAREL NEUWIRT
Mr. Neuwirt is currently a commissioner of the European Council for data protection. He wrote about data protection for DSM already five years ago (see No. 6/2003, pp. 18-22) and now discusses the same topic with editor in chief of DSM Jaroslav Dočkal.
10 / LEGAL COLUMN –EXPERTS FROM THE LEGAL FIRM, ROWAN LEGAL RESPOND
Certain email messages have disclaimers regarding the receipt of an email by an unintended addressee saying that such a person must not use the message content and has to destroy the message. This column will explain whether the delivery of such messages gives rise to any obligations for a third party or whether it represents only moral pressure on the unintended recipients. We will further learn whether it is possible to consider the information that is available but not directly visible to be published.
12 / WHAT INFLUENCES BCM PROGRAMS
New studies by the advisory company, KPMG and Continuity Insight Magazine summarize information about how companies react to current trends in the area of Business Continuity Management – BCM.
15 / PHION ENTERS BOHEMIA
The introduction of a new company offering a product portfolio covering all relevant security aspects from perimeter protection and the secure and highly available connection of branches to protection from dangerous content and protection of the internal network. Editor in chief of DSM Jaroslav Dočkal interviewed Peter Perdich, Channel Account Manager of Phion for Central and Eastern Europe.
16 / OPTIONS HOW TO PROTECT CRITICAL DATA
The article describes the properties of modern backup solutions and the latest trends in data protection. It cites standards and recommended settings for disaster recovery. It highlights the risks of understating these issues on the operations of a company and stresses the importance of knowledge how to prevent data losses and how to react in such cases.
21 / UP-TO-DATE INFORMATION ABOUT COMPANY OF THE YEAR 2007
Cisco Systems received the title of Company of the Year 2007 from the Association for Information Systems Security (ISSA). The article focuses on the current activities of this company.
22 / DISASTER RECOVERY PLANNING - PART I
The article defines the purpose of disaster recovery plans in broader perspective and deals with the formal aspects of these documents. It discusses the relationship between disaster recovery and business continuity plans and draws attention to the value of risk analysis for the creation of business continuity plans. It also explains who the recipients of these plans are.
26 / TRUTHS AND MYTHS IN BCM
The article is a brief contemplation about the status of disaster recovery plans in the Czech Republic, its evaluation from various points of view and an attempt to give pragmatic recommendations so that recovery plans are really useful and functional.
31 / INTERVIEW WITH PROFESSOR ALFRED BÜLLESBACH
Prof. Büllesbach lectures applied computer and legal information science at the University of Bremen. He worked in the area of personal data protection in various roles in Germany, including the position of State Commissioner of the State of Bremen or Global Chief Officer of Data Protection for DaimlerChrysler AG.
32 / DATA PROTECTION SEAL
The article introduces a brief description of the European Data Protection Seal project. The objective of this project is to prepare and test a concept of Europe-wide certificate verifying compliance of IT products and services supported by IT with European directives for privacy and personal data protection.
34 / INTERVIEW WITH TUOMAS AURA
Mr. Aura received his doctorate from the Helsinki University of Technology in 2000. Since then he has been working on network and software security at Microsoft Research in Cambridge. He is also a professor at the Helsinki University of Technology and lectures on network security at University College in London.
36 / EDI ARCHIVE ACCORDING TO EAL2 – PART II
DAVID C. HÁJÍČEK, ZDENĚK SEEMAN, PAVEL VONDRUŠKA
The second in a series of articles analyses how the standard CSN ISO/IEC 15408 has been applied during the development of the Archive of EDI messages project. It describes how the team prepared technical specifications, high-level design, operational documentation, security tests and a compliance audit. It concludes with drawing attention to difficulties encountered by the authors during the project.
41 / AMBITIOUS COMPANIES ASPIRE TO OBTAIN CERTIFICATES
Certification is a powerful weapon in the competitive fight. It offers proof of the professional qualifications of companies and the quality of their products. We have seen a lot of these certificates recently.
42 / QUO VADIS ITIL – PART X. OVERALL APPROACH TO THE ITIL IMPLEMENTATION
The last but one in a series of articles that deals with general recommendations for preparing for an ITIL implementation. It focuses on the setting of goals, evaluation of the current status, how to involve business departments and with which processes you should start. It also describes the role of IT management and the management of business departments during ITIL implementation.
46 / INTERVIEW WITH MATTHEW PEMBLE
Mr. Pemble has a long track record as a security manager, architect and consultant, specializing in incident management and counterfraud. He has experience as the main security architect of the Royal Bank of Scotland, currently working for a number of private and governmental organizations in the area of Internet crime and computer forensic audits.