Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

CIPM Certified Information Privacy

Manager All-in-One Exam Guide 1st


Edition Gregory
Visit to download the full and correct content document:
https://ebookmass.com/product/cipm-certified-information-privacy-manager-all-in-one-
exam-guide-1st-edition-gregory/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

CISM Certified Information Security Manager All-in-One


Exam Guide, 2nd Edition Peter H. Gregory

https://ebookmass.com/product/cism-certified-information-
security-manager-all-in-one-exam-guide-2nd-edition-peter-h-
gregory/

CDPSE Certified Data Privacy Solutions Engineer All-in-


One Exam Guide Peter H. Gregory

https://ebookmass.com/product/cdpse-certified-data-privacy-
solutions-engineer-all-in-one-exam-guide-peter-h-gregory-2/

CDPSE Certified Data Privacy Solutions Engineer All-in-


One Exam Guide Peter H. Gregory

https://ebookmass.com/product/cdpse-certified-data-privacy-
solutions-engineer-all-in-one-exam-guide-peter-h-gregory/

CDPSE Certified Data Privacy Solutions Engineer All-in-


One Exam Guide Peter H. Gregory [Peter H. Gregory]

https://ebookmass.com/product/cdpse-certified-data-privacy-
solutions-engineer-all-in-one-exam-guide-peter-h-gregory-peter-h-
gregory/
CRISC Certified in Risk and Information Systems Control
All-in-One Exam Guide, Second Edition Peter Gregory

https://ebookmass.com/product/crisc-certified-in-risk-and-
information-systems-control-all-in-one-exam-guide-second-edition-
peter-gregory/

CCISO Certified Chief Information Security Officer All-


in-One Exam Guide Steve Bennett

https://ebookmass.com/product/cciso-certified-chief-information-
security-officer-all-in-one-exam-guide-steve-bennett/

HCISPP HealthCare Information Security and Privacy


Practitioner All-in-One Exam Guide Sean P. Murphy

https://ebookmass.com/product/hcispp-healthcare-information-
security-and-privacy-practitioner-all-in-one-exam-guide-sean-p-
murphy/

GCIH GIAC Certified Incident Handler All-in-One Exam


Guide Nick Mitropoulos

https://ebookmass.com/product/gcih-giac-certified-incident-
handler-all-in-one-exam-guide-nick-mitropoulos/

CC Certified in Cybersecurity All-in-One Exam Guide


Steven Bennett

https://ebookmass.com/product/cc-certified-in-cybersecurity-all-
in-one-exam-guide-steven-bennett-2/
ABOUT THE AUTHOR

Peter H. Gregory, CIPM, CDPSE, CISA, CISM, CRISC, CISSP, DRCE,


CCSK, is a 30-year career technologist and a security leader in a
telecommunications company. He has been developing and
managing information security management programs since 2002
and has been leading the development and testing of secure IT
environments since 1990. Peter has also spent many years as a
software engineer and architect, systems engineer, network
engineer, and security engineer. He has written many articles,
whitepapers, user manuals, processes, and procedures throughout
his career, and he has conducted numerous lectures, training
classes, seminars, and university courses.
Peter is the author of more than 40 books about information
security and technology, including Solaris Security, CISM Certified
Information Security Manager All-In-One Exam Guide, and CISA
Certified Information Systems Auditor All-In-One Exam Guide. He
has spoken at numerous industry conferences, including RSA,
Interop, (ISC)² Congress, ISACA CACS, SecureWorld Expo, West
Coast Security Forum, IP3, Source, Society for Information
Management, the Washington Technology Industry Association, and
InfraGard.
Peter serves on advisory boards for cybersecurity education
programs at the University of Washington and the University of
South Florida. He was the lead instructor for nine years in the
University of Washington certificate program in applied cybersecurity,
a former board member of the Washington State chapter of
InfraGard, and a founding member of the Pacific CISO Forum. Peter
is a 2008 graduate of the FBI Citizens Academy and a member of
the FBI Citizens Academy Alumni Association. He is also a member
of the IAPP, ISACA, and (ISC)².
Peter resides with his family in Washington state and can be
found online at www.peterhgregory.com.

About the Technical Editor


John Clark, CIPP/E, CIPT, FIP, CDPSE, CISSP, CISA, CISM, is an
information security executive advisor to CISOs, CIOs, boardrooms,
and business executives. John has contributed to many articles,
blogs, and presentations addressing privacy program management
and has spoken on the topic at industry conferences. With more
than 20 years of experience in information security and privacy, he
has developed a passion for working with clients to develop
sustainable, business-aligned information security and privacy
management programs that can be applied to emerging regulations
with minimal change. In addition to earning multiple industry
certifications, John has a bachelor’s degree in management
information systems and an MBA from the University of Houston.
Copyright © 2021 by McGraw Hill. All rights reserved. Except as
permitted under the United States Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any form or by
any means, or stored in a database or retrieval system, without the
prior written permission of the publisher, with the exception that the
program listings may be entered, stored, and executed in a
computer system, but they may not be reproduced for publication.

ISBN: 978-1-26-047410-7
MHID: 1-26-047410-0

The material in this eBook also appears in the print version of this
title: ISBN: 978-1-26-047409-1, MHID: 1-26-047409-7.

eBook conversion by codeMantra


Version 1.0

All trademarks are trademarks of their respective owners. Rather


than put a trademark symbol after every occurrence of a
trademarked name, we use names in an editorial fashion only, and
to the benefit of the trademark owner, with no intention of
infringement of the trademark. Where such designations appear in
this book, they have been printed with initial caps.

McGraw-Hill Education eBooks are available at special quantity


discounts to use as premiums and sales promotions or for use in
corporate training programs. To contact a representative, please visit
the Contact Us page at www.mhprofessional.com.

Information has been obtained by McGraw Hill from sources believed


to be reliable. However, because of the possibility of human or
mechanical error by our sources, McGraw Hill, or others, McGraw Hill
does not guarantee the accuracy, adequacy, or completeness of any
information and is not responsible for any errors or omissions or the
results obtained from the use of such information.
TERMS OF USE

This is a copyrighted work and McGraw-Hill Education and its


licensors reserve all rights in and to the work. Use of this work is
subject to these terms. Except as permitted under the Copyright Act
of 1976 and the right to store and retrieve one copy of the work,
you may not decompile, disassemble, reverse engineer, reproduce,
modify, create derivative works based upon, transmit, distribute,
disseminate, sell, publish or sublicense the work or any part of it
without McGraw-Hill Education’s prior consent. You may use the
work for your own noncommercial and personal use; any other use
of the work is strictly prohibited. Your right to use the work may be
terminated if you fail to comply with these terms.

THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND


ITS LICENSORS MAKE NO GUARANTEES OR WARRANTIES AS TO
THE ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS
TO BE OBTAINED FROM USING THE WORK, INCLUDING ANY
INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA
HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY
WARRANTY, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
A PARTICULAR PURPOSE. McGraw-Hill Education and its licensors do
not warrant or guarantee that the functions contained in the work
will meet your requirements or that its operation will be
uninterrupted or error free. Neither McGraw-Hill Education nor its
licensors shall be liable to you or anyone else for any inaccuracy,
error or omission, regardless of cause, in the work or for any
damages resulting therefrom. McGraw-Hill Education has no
responsibility for the content of any information accessed through
the work. Under no circumstances shall McGraw-Hill Education
and/or its licensors be liable for any indirect, incidental, special,
punitive, consequential or similar damages that result from the use
of or inability to use the work, even if any of them has been advised
of the possibility of such damages. This limitation of liability shall
apply to any claim or cause whatsoever whether such claim or cause
arises in contract, tort or otherwise.
To my wife Rebekah, my mother, Nathan, Shannon, and my
extended family for their encouragement and support over the past
sixteen years.

To current and aspiring privacy professionals everywhere who own


the mission of protecting personal information about customers,
employees, and constituents.
CONTENTS AT A GLANCE

Chapter 1 Developing a Privacy Program


Chapter 2 Privacy Program Framework
Chapter 3 Privacy Operational Lifecycle: Assess
Chapter 4 Privacy Operational Lifecycle: Protect
Chapter 5 Privacy Operational Lifecycle: Sustain
Chapter 6 Privacy Operational Lifecycle: Respond
Appendix A The Risk Management Life Cycle
Appendix B About the Online Content
Glossary
Index
CONTENTS

Acknowledgments
Introduction

Chapter 1 Developing a Privacy Program


The Privacy Vision
Program Approaches
Privacy Objectives
Executive Sponsorship
Business Alignment
Establish a Data Governance Model
Data Governance
Privacy Governance
Establish a Privacy Program
Strategy Objectives
Risk Objectives
Strategy Resources
Privacy Program Strategy Development
Strategy Constraints
Structure the Privacy Team
Roles
Competency
Privacy Program Communications
Privacy Training and Awareness
Maintaining an Awareness Program
Chapter Review
Quick Review
Questions
Answers

Chapter 2 Privacy Program Framework


Develop the Privacy Program Framework
Privacy Charter
Developing Privacy Policies
Privacy Standards
Privacy Laws
Establishing Legal Basis for Processing
Establishing Legitimate Interest
Controls
Control Frameworks
Data Inventory
Data Classification
Data Use Governance
Implement the Privacy Program Framework
Building a Privacy Operation
Developing and Running Data Protection Operations
Developing and Running Data Monitoring Operations
Working with Data Subjects
Collecting Consent
Working with Authorities
Privacy Program Metrics
Risk Management Metrics
Data Subject Engagement Metrics
Data Governance Metrics
Program and Process Maturity
Performance Measurement
Resilience Metrics
Convergence Metrics
Resource Management Metrics
Online Tracking and Behavioral Profiling
Tracking Techniques and Technologies
Tracking in the Workplace
Tracking Prevention
Chapter Review
Quick Review
Questions
Answers

Chapter 3 Privacy Operational Lifecycle: Assess


Privacy Program Baseline
Process Maturity
Baselining Program Elements
Third-Party Risk Management
Cloud Service Providers
Privacy Regulation Requirements
TPRM Life Cycle
Physical Assessments
Assessing Processing Centers and Work Centers
Document Storage
Document and Media Destruction
Device Security
Mergers, Acquisitions, and Divestitures
Influencing the Transaction
Integrating Programs
Privacy Impact Assessments and Data Privacy Impact
Assessments
Privacy Threshold Analysis
PIA Procedure
Engaging Data Subjects in a PIA
The Necessity of a PIA
Integrating into Existing Processes
Recordkeeping and Reporting
Risks Specific to Privacy
Privacy Threats
Privacy Countermeasures
Chapter Review
Quick Review
Questions
Answers

Chapter 4 Privacy Operational Lifecycle: Protect


Information Security Practices
Identity and Access Management
Technical Security Controls
Administrative Safeguards
Privacy and Security by Design
Integrating Privacy into Organization Operations
Information Security
IT Development and Operations
Business Continuity and Disaster Recovery Planning
Mergers, Acquisitions, Divestitures
Human Resources
Compliance and Ethics
Audit
Marketing
Business Development
Public Relations
Procurement and Sourcing
Legal and Contracts
Security and Emergency Services
Finance
Other Functions
Other Protection Measures
Data Retention and Archiving
Data Destruction
Data Sharing and Disclosure
Costs of Technical Controls
Chapter Review
Quick Review
Questions
Answers

Chapter 5 Privacy Operational Lifecycle: Sustain


Monitoring a Privacy Program
Business Process Monitoring
Privacy and Security Event Monitoring
External Monitoring
Control Self-Assessment
Auditing Privacy Programs
Privacy Audit Scope
Privacy Audit Objectives
Types of Privacy Audits
Privacy Audit Planning
Privacy Audit Evidence
Auditing Specific Privacy Practices
Chapter Review
Quick Review
Questions
Answers

Chapter 6 Privacy Operational Lifecycle: Respond


Data Subject Requests and Privacy Rights
Data Subject Requests
Working with Authorities
Privacy Incident Response
Incident Response Regulations
Phases of Incident Response
Privacy Incident Response Plan Development
Privacy Continuous Improvement
Chapter Review
Quick Review
Questions
Answers

Appendix A The Risk Management Life Cycle


The Risk Management Process
Risk Management Methodologies
NIST Standards
ISO/IEC 27005
Factor Analysis of Information Risk
Asset Identification
Hardware Assets
Subsystem and Software Assets
Cloud-Based Information Assets
Virtual Assets
Information Assets
Asset Classification
Data Classification
Asset Valuation
Qualitative Asset Valuation
Quantitative Asset Valuation
Threat Identification
Internal Threats
External Threats
Advanced Persistent Threats
Emerging Threats
Vulnerability Identification
Third-Party Vulnerability Identification
Risk Identification
Risk, Likelihood, and Impact
Likelihood
Impact
Risk Analysis Techniques and Considerations
Information Gathering
Qualitative Risk Analysis
Semiquantitative Risk Analysis
Quantitative Risk Analysis
OCTAVE
Other Risk Analysis Methodologies
Risk Evaluation and Ranking
Risk Ownership
Risk Treatment
Controls
Costs and Benefits

Appendix B About the Online Content


System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Technical Support

Glossary

Index
ACKNOWLEDGMENTS

I am immensely grateful to Wendy Rinaldi for affirming the need to


have this book published on a tight timeline. My readers, including
current and future privacy managers, deserve nothing less.
Heartfelt thanks to Emily Walters for proficiently managing this
project, facilitating rapid turnaround, and equipping me with the
information and guidance I needed to produce the manuscript.
I want to thank my former consulting colleague, John Clark, who
took on tech reviewing the manuscript. A Fellow of Information
Privacy and a member of the International Association of Privacy
Professionals, John carefully and thoughtfully scrutinized the entire
draft manuscript and made scores of practical suggestions that have
improved the book’s quality and value for readers.
Next, I want to thank my former consulting colleague, Greg Tyler,
with whom I worked in a consulting role in data protection projects.
His insight has been invaluable to our clients and to me. Also, I want
to thank Kate Schenker, ITIL, CTPRP, for her records management
expertise and insight.
Many thanks to Janet Walden and Neelu Sahu for managing the
editorial and production ends of the project and to Lisa Theobald for
copy editing the book and further improving readability. I appreciate
KnowledgeWorks Global Ltd. for expertly rendering my sketches into
beautifully clear line art and laying out the pages. Like stage
performers, they make hard work look easy.
Many thanks to my literary agent, Carole Jelen, for her diligent
assistance during this and other projects. Sincere thanks to Rebecca
Steele, my business manager and publicist, for her long-term vision
and for keeping me on track.
Virtually all of the work producing this book was completed during
the COVID-19 pandemic. In addition to life’s everyday pressures and
challenges, everyone involved in this project stayed on task and
completed their typical high-quality work on schedule. This effort
was likely quite difficult for some of you. I admire your drive and
your dedication to serve our readers with nothing but the best.
Privacy professionals around the world depend upon it.
Despite having written more than 40 books, I have difficulty
putting into words my gratitude for my wife, Rebekah, for tolerating
my frequent absences (in the home office) while I developed the
manuscript. This project could not have been completed without her
loyal and unfailing support and encouragement.
INTRODUCTION

The information revolution has transformed businesses,


governments, and people in profound ways. Virtually all business
and government operations are now digital, resulting in everyone’s
personal details stored in information systems.
Two issues have arisen out of this transformation: the challenge
to safeguard personal information from criminal organizations, and
the challenge to ensure that personal information is used only for
clearly stated purposes. Difficulties in meeting these challenges have
helped create and emphasize the importance of the cybersecurity
and information privacy professions. Numerous security and privacy
laws, regulations, and standards have been enacted and created,
imposing a patchwork of new requirements on organizations and
governments to enact specific practices to protect and control the
use of our personal information.
These developments continue to drive demand for information
privacy, information security professionals, and leaders in both
privacy and security. These highly sought-after professionals play a
crucial role in developing better information privacy and security
programs that result in reduced risk and improved confidence.
The Certified Information Privacy Manager (CIPM) certification,
established by IAPP in 2013, will light the path for tens of thousands
of privacy and security professionals who need to demonstrate
competence in the privacy field. The International Association of
Privacy Professionals (IAPP), the creator of the Certified Information
Privacy Manager, the Certified Information Privacy Professional
(CIPP), the Certified Information Privacy Technologist (CIPT), and
other certifications, is one of the world’s leading privacy
management and professional development organizations.
Another random document with
no related content on Scribd:
Leroux, Xavier, 392
Leschetizky, Theodor, 409
Libraries, chained, in England, 190
Lieurance, Thurlow, 487
Lind, Jenny, 335, 338, 449, 451
Liszt, Franz, 313, 322;
influence of, on Wagner, 361;
his life and work, 403–8;
sends scores to Thomas in America, 468
Locke, Matthew, 203, 205
Loeffler, Charles Martin, 482–3
Lohengrin, Wagner’s, 366, 368, 375.
Loomis, Harvey Worthington, 485
Louis XIV of France, 222 ff., 232, 312
Louise, Charpentier’s, 393–4
Lucia di Lammermoor, Donizetti’s, 337
Lucrezia Borgia, Donizetti’s, 337
Ludwig II, King of Bavaria, 370
Lullabies, 109–10
Lully, Jean Baptiste, 223–7, 233
Lute, the, use of, by the ancient Egyptians, 22;
by the Arabs, 59, 60;
introduction of, into Europe, 96;
use and development of, in 15th and 16th centuries, 150–1
Luther, Martin, 163, 165–7
Lyon, Rev. James, early American hymn book by, 460
Lyre, the, use of, by the ancient Egyptians, 22;
by the Assyrians, 25;
by the Greeks, 42
M
MacDowell, Edward, 491–4, 507;
Critical and Historical Essays by, cited, 45, 52–3
McTammany, John, and automatic pianos, 316
Macfarren, Sir George A., 438
Macfarren, Walter Cecil, 438
Mackenzie, Sir Arthur C., 438
Madame Butterfly, Puccini’s, 50, 383–4
Madrigals, 149 ff.;
golden age of, in England, 194
Maeterlinck, Maurice, 394
Magic Flute, The, Mozart’s, 288, 289, 291, 329
Mahler, Gustav, 427–8
Malibran, Mme., 465
Malipiero, G. Francesco, 539–40
Man, prehistoric, beginnings of music and musical instruments
among, 3–7
Mannheim School of composers, 273–4
Manon, Massenet’s, 392
Manon Lescaut, Puccini’s, 383
Manuel, Roland, 523
Manzoni, 381
Maria Theresa, 267, 299
Marie Antoinette, 213–14, 269, 271–2
Marlin, Jane, Reminiscences of Morris Steinert, by, 315–16
Marriage of Figaro, Rossini’s, 337
Martinengo-Cesaresco, Countess, The Study of Folk Songs, by, 140
Martini, Padre, 218–19
Masaniello, Auber’s, 334
Mascagni, Pietro, 382
Mason, Daniel Gregory, 403, 471
Mason, Lowell, 470
Mason, Dr. William, 470–1
Masques, in England, 173
Massenet, Jules, 391–2
Mastersingers, 104–6
Matthews, W. S. B., 471
Mattheson, Johann, 242–3
Mauduit, Jacques, 177, 178
Mayer, Charles, 344
Mazarin, Cardinal, 178, 222
Mechanical pianos, 316–19
Medici, Marie de’, 176, 178, 222
Medicine man, the, among the American Indians, 15–16
Mefistofele, Boito’s, 381
Méhul, Etienne Nicholas, 332
Meistersinger, The, Wagner’s, 369, 370–1, 372, 375
Mendelssohn-Bartholdy, Felix, 347–51, 353
Mendelssohn Glee Club of New York, 494
Messager, André, 392
Messiah, The, Handel’s, 262
Metastasio, 213, 265
Metre, introduction of, into music, 83–4
Metropolitan Museum of Art, clavichords and harpsichords in, 310
Metropolitan Opera House, New York, 469
Meyerbeer, Giacomo, 334–5;
influence of, on Wagner, 360–1, 364–5
Miaskovsky, Nicolai, 531
Mignon, Thomas’s, 386
Mikado, The, Sullivan’s, 341
Mildenberg, Albert, 497–8
Milhaud, Darius, 525
Milligan, Harold Vincent, quoted on American folk music, 141
Milton, John, father of the poet, 202
Milton, John, 173, 202
Minnesingers, 102–3
Minstrel, the, 88 ff.
“Miracle-plays,” 172
Modes, development of, in church music, 71–3
Mohammed, 56
Mohammedans, capture of Constantinople by, 165
Monochord, invented by Pythagoras, 41
Montemezzi, 385–6
Monteverde, Claudio, his innovations in music, and his operatic and
other works, 178–86
Montpensier, Mlle. de, 223–4
Moonlight Sonata, Beethoven’s, 300, 304
“Moralities,” 172, 173
Morley, Thomas, 194, 196, 198, 199
Morris, Harold, 506
Morris dance, the, 123–4
Moscheles, Ignaz, 320–1
Moses, 26, 27
Moszkowski, Moritz, 449
Motet, the, 147–9
Mourning songs, 126
Moussorgsky, Modeste, 444
Mouton, Jean, 155
Mozart, Wolfgang Amadeus, Haydn his teacher and friend, 284–5;
account of his life, 285–90;
Don Giovanni, 288, 290, 291;
The Magic Flute, 288, 289, 291, 329;
his work, 290–2;
influence of, on Wagner, 360
Muses, the nine, of the Greeks, 32
Music, the process of change in, 515–19
Musical instruments, see Instruments, musical
Musical terms, derived from the Italian language, 206–7
“Mysteries,” 172
N
Napoleon I, 293, 298, 442
National Federation of Music Clubs, 479
National hymns, 115–17
Nature, sounds of, imitated by primitive man, 6;
personified in gods of the ancient Egyptians, 21
Naumann, Emil, 281, 285
Negro, the, and his music, 17–19
“Negro minstrels,” origin of, 473
Negroes, American, folk music of, 117, 118, 143–4;
their spirituals, 144, 500–1;
Stephen Foster and their music, 472, 473;
Henry F. Gilbert’s music founded on negro themes, 484
Neidlinger, William, 490
Neri, Saint Filippo, founder of oratorio, 171
Nero, Emperor, 45
Nero, Boito’s, 381, 382
Nevin, Arthur, 487
Nevin, Ethelbert, 488
New England Conservatory of Music, Boston, 476, 477
New England group of composers, the, 475 ff.
New York Philharmonic Society, founding of, 467
New York Symphony Society, 468
Netherlands, the, modern music in, 541
Neumes notation, 72
Nibelungen Ring, The, Wagner’s, 364, 366 ff.
Nikisch, Arthur, 412
Nilsson, Christine, 451
Nordica, Lillian, 469
Norma, Bellini’s, 337
Norris, Homer, 484
Norsemen, the, 91–2
Norway, composers of, 449–51
Notation of music, the Greeks the first to use, 40;
the Japanese, 51;
the Hindus, 65–6;
use of neumes, 72;
beginnings of the staff and harmony, 77 ff.;
the three, four and five line staffs and development of clefs, 79–80;
naming of notes of the scale, 81–2;
introduction of time values, 83–4;
tablature, 151
O
Oberammergau, Passion Play of, 173
Oberon, Weber’s, 329
Oboe, use of, by the Hindus, 66
Odin, 92
Offenbach, Jacques, 335–6
Okeghem, Jan, 153–4
Old Folks at Home, The, 474
Oldberg, Arne, 490
Olympic games, 37
Opera, the descendant of the masque, 173;
beginnings of, in Italy, 173 ff.;
the coming of Italian opera to France, 178;
operas of Monteverde, 181 ff.;
first public opera house in Venice, 185;
Italian opera composers of 17th and 18th centuries, 212–13;
opera in France, 15th to 18th centuries, 222–31;
Handel, 255 ff.;
Gluck, the father of modern opera, 263 ff.;
Haydn, 275 ff.;
Mozart, 285 ff.;
opera makers of France, Germany and Italy, 1741 to Wagner, 326
ff.;
Weber, 327–9;
the French school, 330 ff.;
Cherubini, 331–2;
Meyerbeer, 334–5;
Offenbach, 335–6;
Rossini, Bellini, Donizetti, 337–8;
opera singers of the late 18th and 19th centuries, 338;
English opera-ballad, 338–41;
light opera, 341–2;
Wagner, 359–76;
Verdi and Meyerbeer to our day, 377 ff.;
modern Italian opera, 377–86;
French opera, 386–95;
German opera composers since Wagner, 395–6;
early opera in America, 465–6;
opera companies in America, 514
Opéra comique, 330
Oratorio, Saint Filippo Neri the founder of, 171
Oratorio Society of New York, 468
Orchestra, size of ancient Egyptian, 22;
of the Roman theatre, 45;
of the Hindus, 64–5;
the Russian balalaika orchestra, 130;
the Hungarian gypsy orchestra, 134;
Monteverde’s, 181–2, 185;
meaning of the word, 234;
Haydn’s additions and improvements in the, 283;
rise of, in 19th century, 323;
the innovations of Berlioz, 401–2;
orchestras in America, 466–8;
symphony orchestras in America, 513–14
Organ school, the 17th century, 157–8
Organs, early, 85, 235–7
Orientals, music of the, 46 ff.
Ornstein, Leo, 508
Orpheus, 34–5
Orpheus and Euridice, Gluck’s, 268
Overtones, 528–9
Oxford, first chair of music at, 190
P
Pachelbel, Johann, 240
Pacius, Frederick, 453
Paderewski, Ignace Jan, 322, 449
Paganini, Nicolo, 324
Paine, John Knowles, 475–6
Palestrina, 167–70, 171
Palmgren, Selim, 453
Pan and his pipes, 32–3;
the organ a descendant of Pan’s pipes, 235
Paris, as meeting place for composers, 330 ff.
Paris Conservatory of Music, 430–2
Parker, Horatio, 478–9
Parry, Sir Charles Hubert Hastings, 438
Parsifal, Wagner’s, 372–3, 374
Passion Play of Oberammergau, 173
Patience, Sullivan’s, 341
Patriotic songs, 115–17
Patrons of music in America, 512–13
Patti, Adelina, 338
Payne, John Howard, 465
Peace Jubilees, in Boston, 486
Pelleas and Milisande, Debussy’s, 394, 416, 520
Pentatonic scale, 10, 18, 47, 113
People’s Choral Union, New York, 470
Pepys, Samuel, 198, 204
Percy Reliques, the, 106, 127
Pergolesi, Giovanni Battista, 212–13, 230
Persian music, 57
Peter the Great, 441
Pfitzner, Hans, 424, 535
Philadelphia, music in Franklin’s, 463, 464
Pianists, 319 ff.;
of the late 19th and the 20th centuries, 325
Pianoforte, the, 307 ff.;
its ancestry and development through the clavichord and the
harpsichord, 307–11;
the first pianofortes, and their makers, 311–15;
automatic players, 316–17;
value of mechanical players, 318–19;
performers on the, 319 ff.
Piccinni, 269, 270
Pierné, Gabriel, 392, 393
Pilgrims and Puritans in America, 458–60
Pinafore, Sullivan’s, 341
Pirates of Penzance, Sullivan’s, 341
Pius IX, Pope, 406
Pizzetti, Ildebrando, 540
Plagal scales, 72, 73
Plain chant, or plain song, 73
Playford, John, 197
Pleyel, Ignaz Josef, piano maker, 314
Pleyel, Marie, 323
Poe, Edgar Allan, 474
Poet and Peasant, von Suppé’s, 336
Poland, composers of, 448–9
Poland, modern music in, 531–2
Poldowski (Lady Dean Paul), 439–40, 531
Poles, folk music of, 113–14, 131;
instruments of, 131
Polish dances, 121
Polyform music, 516 ff.
Polyphony, introduction into church music, 70–1
Polytonality, 516, 517, 529
Ponchielli, Amilcare, 386
Pope, Alexander, 262
Porpora, Niccolo, 213–14
Portuguese folk music, 135
Powell, John, 499–500
Pratt, Silas G., 489
Pratt, Waldo Selden, History of Music by, quoted, 102–3
Prehistoric man, beginnings of music and musical instruments
among, 3–7
Près, Josquin des, 148, 154–5
Prescott, Wm. H., Conquest of Peru by, cited, 53
Printing, invention of, 163–4
“Program music,” 242, 397
Prokofiev, Serge, 531
Prophet, The, Meyerbeer’s, 335
Protestant Church, founding of the, 165
Provence, the troubadours poet-composers of, 97
Prunières, Henry, quoted on Monteverde, 185–6
Psaltery, the, 28, 29, 308
Public concerts, the first, 272–3
Puccini, Giacomo, 383–5
Purcell, Henry, 200, 204, 205–7
Puritans and Pilgrims in America, 458–60
Pythagoras, influence of, in music, 40–2;
his theory of harmonics or overtones, 526, 528
Pythian games, 37
Q
Quarter-tones, use of, 538–9
R
Rachmaninov, Sergei, 409–10, 446
Radio, the, 319
Ragtime music, 143–4
Rameau, Jean Philippe, 227–31
Rattle, use of, by American Indians, 11, 12
Ravel, Maurice, 417, 522–4
Rebeck, the, 189
Recitative style, the, 183
Reformation, the, 165
Reger, Max, 428–9
Reinken, Johann Adam, 239
Remenyi, 420
Renaissance, the, 163
Respighi, Ottorino, 540
Reyer, Ernest, 389
Rheingold, Das, Wagner’s, 367, 371
Rhythm, 517–18
Rice, Thomas, 473
Richard the Lion-Hearted, 99
Ries, Ferdinand, 299, 320
Rigoletto, Verdi’s, 379
Rimsky-Korsakov, Nikolai, 444, 445
Ritter, Alexander, 411, 413
Robert le Diable, Meyerbeer’s, 335
Robin Hood, De Koven’s, 336, 488
Romance languages, the, 96–7
Romans, music of the, 43–5
Romantic movement in music, the, 294–5, 320–2, 343 ff.
Romberg, Andreas, 324
Rome, the great musical center in the 18th century, 219
Rome, American Academy in, 507–8
Ronsard, Pierre de, 160–1, 456
Rore, Cyprian de, 156
Roses, War of the, in England, 187
Rosetta stone, the, 23
Rossini, Giacchino, 337
Rounds, 101–2, 123
Rousseau, Jean Jacques, 269;
quoted on folk music of Brittany, 136
Rubinstein, Anton, 322, 408, 443, 446
Rubinstein, Nikolai, 409, 443, 446
Russia, folk music in, 114, 129–30;
stringed instruments in, 130;
composers of, 441 ff.;
Michael Glinka, 442;
Rubinstein and Tchaikovsky, 443;
“the Five” group of composers, 444–6;
other composers, 446
S
Sackbut, the, 189
Sailors’ songs, 117
St. Bartholomew’s eve, massacre of, in France, 177
Saint-Saëns, Charles Camille, 386, 390–1
Salieri, Antonio, 332
Salome, Strauss’s, 412, 413, 415
Salon music, 322
Salzedo, Carlos, 511
Samson and Delilah, Saint-Saëns’s, 390
Sand, George, 357
Satie, Erik, 524, 525
Savages, the music of, 8 ff.
Sax horn, the, 401
Saxophone, the, 401
Scales: the pentatonic, 10, 18, 47, 113;
the ancient Egyptian, 23;
of the Greeks, 37–40;
of the Romans, 44;
of the Chinese, 47–8;
of the Arabs, 58–9;
of the Hindus, 65–6;
of St. Ambrose, 71, 72, 73;
plagal, of Pope Gregory, 72, 73;
of Hucbald and Guido d’Arezzo, 80–1;
naming of notes of our scale, 81–2
Scarlatti, Alessandro, 212
Scarlatti, Domenico, 220–1
Scheidt, Samuel, 241
Schein, Johann Heinrich, 241
Schelling, Ernest, 455, 499
Scherchen, Hermann, 536
Schillings, Max, 395
Schindler, Kurt, 512
Schirmer, Gustav, 513
Schmidt, Arthur P., 513
Schoenberg, Arnold, 532–3
Schola Cantorum, of Paris, 434, 435
Schools of music: of the 15th and 16th centuries, 146 ff.;
rise of, 151–2;
the Franco-Flemish school, 152–5;
the Venetian school, 155–7;
the 17th century organ school, 157–8
Schrecker, Franz, 535
Schubert, Franz Peter, 344–7
Schumann, Clara, 321, 420–1, 422
Schumann, Robert, 351–4, 420–1
Schütz, Heinrich, 240–1
Scotch and Welsh folk music, 137–9
Scott, Cyril, 544
Scotti, Antonio, 383, 384
Scriabin, Alexander Nicolai, 446, 526–7
Scribe, Eugène, 335
Seasons, The, Haydn’s, 281
Seidl, Anton, 428, 469
Shakespeare, 173;
and music, 199–200;
and the harpsichord, 310
Shofar, use of, by the Hebrews, 27
“Shout,” the, negro dance, 144
Siamese, music of the, 52
Sibelius, Jan, 452–3
Siegfried, Wagner’s, 367, 368, 410
Signatures, time, origin of signs for, 84
Sinding, Christian, 450
Singleton, Esther, The Orchestra and Its Instruments, by, 215
Sistrum, the, use of, by the ancient Egyptians, 22
Sjögren, Emil, 452
Skalds, Scandinavian, 91–4
Skilton, Charles Sanford, 487
Smart, Henry, 340
Smetana, Frederick, 446–7
Smith, David Stanley, 479–80
Smyth, Dame Ethel, 439
Société Nationale of Paris, 433–4
Solomon, King, singers and musicians of, 28
Sonata form, the, 243
Sonata, the first, 206, 241, 242
Song writers, of the late 19th century, 423 ff.
Song writers, American women, 481
Song writers, recent, of America, 509–10
Songs, patriotic, 115–17
Sonneck, Oscar G., Early Concert-life in America by, quoted, 459–
60
Sousa, John Philip, 487
Spain, composers of, 453–5
Spalding, Albert, 505
Spalding, Walter R., 475, 478
Spanish dance-songs, 122;
folk music, 135
Spinet, the, 210, 311
Spirituals, songs of the American negro, 144
Spirituals, negro, versus jazz, 500–1
Spohr, Louis, 329
Spohr, Ludwig, 324–5
Spontini, Gasparo, 332–3
Stabat Mater, Rossini’s, 337
Staff, the beginnings of, 77, 79, 80
Stainer, Sir John, 341, 438
Stanford, Sir Charles Villiers, 439
Steinways, the, piano makers, 315
Stevenson, Robert Louis, 389
Stock, Frederick, 468
Stoessel, Albert, 468, 506
Stojowski, Sigismund, 449
Stonehenge, 90
Stoughton Musical Society, 462
Stradella, 212
Strauss, Johann, 335, 336
Strauss, Richard, life and work of, 410–15, 424, 534
Stravinsky, Igor, 318, 446, 527–8, 530–1, 538–9
Streicher, Nanette, 313
Stringed instruments, the origin of, 307–8
Suites, dance tunes grow up into, 210–2
Sullivan, Sir Arthur, 336, 341–2
Suppé, Franz von, 336
Svendsen, Johan Severan, 450
Sweden, composers of, 452
Sweelinck, Jan, 157–8, 197, 240
Switzerland, modern music in, 541–2
Symphony, first composers of, in Germany, 273–4
Symphony orchestras in America, 513–14
Syrinx, or Pan’s pipes, 33
Szymanowski, Karol, 531
T
Tablature, 151
Tales of Hoffmann, The, Offenbach’s, 336
Tallis, Thomas, 192, 197
Tambourine, use of, by the ancient Egyptians, 22;
by the Assyrians, 25;
by the Hindus, 66
Tannhäuser, Wagner’s, 365–6, 370, 401
Tansman, Alexander, 532
Tartini, 218
Tasso, Torquato, 174, 180, 184
Tausig, Carl, 409, 448
Taylor, Deems, 506
Taylor, Samuel Coleridge, 439
Tchaikovsky, P. I., 409, 443, 446
Terpander, supposed perfection of tetrachord by, 39–40
Tetrachords, 38, 39, 44
Thomas, Arthur Goring, 438–9
Thomas, Charles Ambroise, 386
Thomas, Theodore, 467–8, 471
Thuille, Ludwig, 395
Tibia, or bagpipe, the Roman, 45
Timbrel, use of, by the Hebrews, 26
Time values, introduction of, into music, 83–4
Tone poets, 397 ff.
Tone relationship, Pythagoras’ theory of, 41
Torelli, 218
Tosca, Puccini’s, 384
Toscanini, Arturo, 382
Tourte, François, perfection of violin bow by, 323
Tremolo, invention of, 184
Trent, Council of, action of, on church music, 167
Trinity Church, New York, 464
Tristan and Isolde, Wagner’s, 369, 370, 372
Troubadours, the, 97, 99–101
Trouvères, the, 97, 101–2
Troyer, Carlos, 485
Trumpets, use of, in war by the ancient Egyptians, 22;
use of, by the Hebrews, 27;
by the Greeks, 43;
by the Hindus, 66
Twentieth century music, 515 ff.
Tyndale, William, 190
Tyrol, the, making of lutes and viols in, 215
U
Unfinished Symphony, Schubert’s, 346
United States, the, folk music in, 140–5;
modern music of, 456 ff;
lack of definite traits in music of, that could be called national,
457;
Pilgrims and Puritans, 458–60;
William Billings, 460–2;
the Stoughton Musical Society, 462;
the Boston Handel and Haydn Society, 462;
music in Franklin’s Philadelphia, 463;
Francis Hopkinson, 463–4;
early opera, 465–6;
orchestras, 466–7;
the New York Philharmonic Society, 467;
Theodore Thomas, 467–8;
the Damrosch family, 468–70;
the Mason family, 470–1;
Gottschalk, 471–2;
Stephen Collins Foster, 472–4;
the New England group of composers, 475 ff.;
Dudley Buck, 476;
George Chadwick, 476–7;
Horatio Parker, 478–9;
women composers and song writers, 480–1;
Loeffler, 482–3;
Victor Herbert, 486;
Sousa, 487;
Ethelbert Nevin, 488;
Reginald de Koven, 488–9;
MacDowell, 491–4;
Henry Holden Huss, 495;
Albert Mildenberg, 497–8;
John Alden Carpenter, 498;
Eric Delamater, 498–9;
John Powell, 499–500;
negro Spirituals versus Jazz, 500–1;
Louis Gruenberg, 502–3;
Irving Berlin, 503;
George Gershwin, 503;
Charles Tomlinson Griffes, 504–5;
the American Music Guild, 506–7;
the American Academy in Rome, 507–8;
Leo Ornstein, 508;
song writers, 509–10;

You might also like