|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_on1347026755 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
008 |
221015s2017 xx o ||| 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|c EBLCP
|d HF9
|d OCLCQ
|d EBLCP
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCL
|d OCLCQ
|
020 |
|
|
|a 9781119232025
|
020 |
|
|
|a 1119232023
|
035 |
|
|
|a (OCoLC)1347026755
|
050 |
|
|
|a KF1263.C65 |b K67 2017
|
082 |
0 |
4 |
|a 343.7309/99
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Kosseff, Jeff.
|
245 |
1 |
0 |
|a Cybersecurity Law
|h [electronic resource].
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2017.
|
300 |
|
|
|a 1 online resource (526 p.).
|
490 |
1 |
|
|a New York Academy of Sciences Ser.
|
500 |
|
|
|a Description based upon print version of record.
|
505 |
0 |
|
|a Intro -- Title Page -- Copyright -- Table of Contents -- Dedication -- About the Author -- Acknowledgment -- About the Companion Website -- Introduction -- Private Sector Data Security Laws (Chapters 1-4) -- Anti-Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- Chapter 1: Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.2 State Data Breach Notification Laws -- 1.3 State Data Security Laws
|
505 |
8 |
|
|a 1.4 State Data Disposal Laws -- Chapter 2: Cybersecurity Litigation -- 2.1 Article III Standing -- 2.2 Common Causes of Action Arising from Data Breaches -- 2.3 Class Action Certification in Data Breach Litigation -- 2.4 Insurance Coverage for Cybersecurity Incidents -- 2.5 Protecting Cybersecurity Work Product and Communications from Discovery -- Chapter 3: Cybersecurity Requirements for Specific Industries -- 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule -- 3.2 Financial Institutions and Creditors: Red Flag Rule
|
505 |
8 |
|
|a 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) -- 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule -- 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards -- 3.6 Nuclear Regulatory Commission Cybersecurity Regulations -- Chapter 4: Cybersecurity and Corporate Governance -- 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies
|
505 |
8 |
|
|a 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches -- 4.3 Committee on Foreign Investment in the United States and Cybersecurity -- 4.4 Export Controls and the Wassenaar Arrangement -- Chapter 5: Anti-Hacking Laws -- 5.1 Computer Fraud and Abuse Act -- 5.2 State Computer Hacking Laws -- 5.3 Section 1201 of the Digital Millennium Copyright Act -- 5.4 Economic Espionage Act -- Chapter 6: Public-Private Cybersecurity Partnerships -- 6.1 U.S. Government's Civilian Cybersecurity Organization
|
505 |
8 |
|
|a 6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015 -- 6.3 Energy Department's Cyber-Threat Information Sharing -- 6.4 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework -- 6.5 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act -- Chapter 7: Surveillance and Cyber -- 7.1 Fourth Amendment -- 7.2 Electronic Communications Privacy Act -- 7.3 Communications Assistance for Law Enforcement Act (CALEA) -- 7.4 Encryption and the All Writs Act
|
500 |
|
|
|a Chapter 8: Cybersecurity and Federal Government Contractors
|
520 |
|
|
|a Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material. -- Provided by publisher.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
655 |
|
0 |
|a Electronic books.
|
758 |
|
|
|i has work:
|a Cybersecurity law (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFQVg3BgP9kxyqwfVYDTHC
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Kosseff, Jeff
|t Cybersecurity Law
|d Newark : John Wiley & Sons, Incorporated,c2017
|z 9781119231509
|
830 |
|
0 |
|a New York Academy of Sciences Ser.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=7104489
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL7104489
|
994 |
|
|
|a 92
|b IZTAP
|