Cybersecurity Law
Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material. -- Provided by publisher.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated,
2017.
|
Colección: | New York Academy of Sciences Ser.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Intro
- Title Page
- Copyright
- Table of Contents
- Dedication
- About the Author
- Acknowledgment
- About the Companion Website
- Introduction
- Private Sector Data Security Laws (Chapters 1-4)
- Anti-Hacking Laws (Chapter 5)
- Public-Private Security Efforts (Chapter 6)
- Government Surveillance Laws (Chapter 7)
- Cybersecurity Requirements for Government Contractors (Chapter 8)
- Privacy Law (Chapter 9)
- Chapter 1: Data Security Laws and Enforcement Actions
- 1.1 FTC Data Security
- 1.2 State Data Breach Notification Laws
- 1.3 State Data Security Laws
- 1.4 State Data Disposal Laws
- Chapter 2: Cybersecurity Litigation
- 2.1 Article III Standing
- 2.2 Common Causes of Action Arising from Data Breaches
- 2.3 Class Action Certification in Data Breach Litigation
- 2.4 Insurance Coverage for Cybersecurity Incidents
- 2.5 Protecting Cybersecurity Work Product and Communications from Discovery
- Chapter 3: Cybersecurity Requirements for Specific Industries
- 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule
- 3.2 Financial Institutions and Creditors: Red Flag Rule
- 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS)
- 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards
- 3.6 Nuclear Regulatory Commission Cybersecurity Regulations
- Chapter 4: Cybersecurity and Corporate Governance
- 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies
- 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches
- 4.3 Committee on Foreign Investment in the United States and Cybersecurity
- 4.4 Export Controls and the Wassenaar Arrangement
- Chapter 5: Anti-Hacking Laws
- 5.1 Computer Fraud and Abuse Act
- 5.2 State Computer Hacking Laws
- 5.3 Section 1201 of the Digital Millennium Copyright Act
- 5.4 Economic Espionage Act
- Chapter 6: Public-Private Cybersecurity Partnerships
- 6.1 U.S. Government's Civilian Cybersecurity Organization
- 6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015
- 6.3 Energy Department's Cyber-Threat Information Sharing
- 6.4 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework
- 6.5 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act
- Chapter 7: Surveillance and Cyber
- 7.1 Fourth Amendment
- 7.2 Electronic Communications Privacy Act
- 7.3 Communications Assistance for Law Enforcement Act (CALEA)
- 7.4 Encryption and the All Writs Act