Cargando…

Cybersecurity Law

Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material. -- Provided by publisher.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kosseff, Jeff
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2017.
Colección:New York Academy of Sciences Ser.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_on1347026755
003 OCoLC
005 20240329122006.0
006 m o d
008 221015s2017 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d HF9  |d OCLCQ  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL  |d OCLCQ 
020 |a 9781119232025 
020 |a 1119232023 
035 |a (OCoLC)1347026755 
050 |a KF1263.C65 |b K67 2017 
082 0 4 |a 343.7309/99  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Kosseff, Jeff. 
245 1 0 |a Cybersecurity Law  |h [electronic resource]. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2017. 
300 |a 1 online resource (526 p.). 
490 1 |a New York Academy of Sciences Ser. 
500 |a Description based upon print version of record. 
505 0 |a Intro -- Title Page -- Copyright -- Table of Contents -- Dedication -- About the Author -- Acknowledgment -- About the Companion Website -- Introduction -- Private Sector Data Security Laws (Chapters 1-4) -- Anti-Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- Chapter 1: Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.2 State Data Breach Notification Laws -- 1.3 State Data Security Laws 
505 8 |a 1.4 State Data Disposal Laws -- Chapter 2: Cybersecurity Litigation -- 2.1 Article III Standing -- 2.2 Common Causes of Action Arising from Data Breaches -- 2.3 Class Action Certification in Data Breach Litigation -- 2.4 Insurance Coverage for Cybersecurity Incidents -- 2.5 Protecting Cybersecurity Work Product and Communications from Discovery -- Chapter 3: Cybersecurity Requirements for Specific Industries -- 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule -- 3.2 Financial Institutions and Creditors: Red Flag Rule 
505 8 |a 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) -- 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule -- 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards -- 3.6 Nuclear Regulatory Commission Cybersecurity Regulations -- Chapter 4: Cybersecurity and Corporate Governance -- 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 
505 8 |a 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches -- 4.3 Committee on Foreign Investment in the United States and Cybersecurity -- 4.4 Export Controls and the Wassenaar Arrangement -- Chapter 5: Anti-Hacking Laws -- 5.1 Computer Fraud and Abuse Act -- 5.2 State Computer Hacking Laws -- 5.3 Section 1201 of the Digital Millennium Copyright Act -- 5.4 Economic Espionage Act -- Chapter 6: Public-Private Cybersecurity Partnerships -- 6.1 U.S. Government's Civilian Cybersecurity Organization 
505 8 |a 6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015 -- 6.3 Energy Department's Cyber-Threat Information Sharing -- 6.4 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework -- 6.5 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act -- Chapter 7: Surveillance and Cyber -- 7.1 Fourth Amendment -- 7.2 Electronic Communications Privacy Act -- 7.3 Communications Assistance for Law Enforcement Act (CALEA) -- 7.4 Encryption and the All Writs Act 
500 |a Chapter 8: Cybersecurity and Federal Government Contractors 
520 |a Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material. -- Provided by publisher. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
655 0 |a Electronic books. 
758 |i has work:  |a Cybersecurity law (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFQVg3BgP9kxyqwfVYDTHC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Kosseff, Jeff  |t Cybersecurity Law  |d Newark : John Wiley & Sons, Incorporated,c2017  |z 9781119231509 
830 0 |a New York Academy of Sciences Ser. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=7104489  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL7104489 
994 |a 92  |b IZTAP