Cargando…

Cybersecurity Law

Written in an accessible manner, this definitive guide to cybersecurity law provides real-world examples and case studies to help readers understand the practical applications of the presented material. -- Provided by publisher.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Kosseff, Jeff
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2017.
Colección:New York Academy of Sciences Ser.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Intro
  • Title Page
  • Copyright
  • Table of Contents
  • Dedication
  • About the Author
  • Acknowledgment
  • About the Companion Website
  • Introduction
  • Private Sector Data Security Laws (Chapters 1-4)
  • Anti-Hacking Laws (Chapter 5)
  • Public-Private Security Efforts (Chapter 6)
  • Government Surveillance Laws (Chapter 7)
  • Cybersecurity Requirements for Government Contractors (Chapter 8)
  • Privacy Law (Chapter 9)
  • Chapter 1: Data Security Laws and Enforcement Actions
  • 1.1 FTC Data Security
  • 1.2 State Data Breach Notification Laws
  • 1.3 State Data Security Laws
  • 1.4 State Data Disposal Laws
  • Chapter 2: Cybersecurity Litigation
  • 2.1 Article III Standing
  • 2.2 Common Causes of Action Arising from Data Breaches
  • 2.3 Class Action Certification in Data Breach Litigation
  • 2.4 Insurance Coverage for Cybersecurity Incidents
  • 2.5 Protecting Cybersecurity Work Product and Communications from Discovery
  • Chapter 3: Cybersecurity Requirements for Specific Industries
  • 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule
  • 3.2 Financial Institutions and Creditors: Red Flag Rule
  • 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS)
  • 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule
  • 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards
  • 3.6 Nuclear Regulatory Commission Cybersecurity Regulations
  • Chapter 4: Cybersecurity and Corporate Governance
  • 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies
  • 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches
  • 4.3 Committee on Foreign Investment in the United States and Cybersecurity
  • 4.4 Export Controls and the Wassenaar Arrangement
  • Chapter 5: Anti-Hacking Laws
  • 5.1 Computer Fraud and Abuse Act
  • 5.2 State Computer Hacking Laws
  • 5.3 Section 1201 of the Digital Millennium Copyright Act
  • 5.4 Economic Espionage Act
  • Chapter 6: Public-Private Cybersecurity Partnerships
  • 6.1 U.S. Government's Civilian Cybersecurity Organization
  • 6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015
  • 6.3 Energy Department's Cyber-Threat Information Sharing
  • 6.4 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework
  • 6.5 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act
  • Chapter 7: Surveillance and Cyber
  • 7.1 Fourth Amendment
  • 7.2 Electronic Communications Privacy Act
  • 7.3 Communications Assistance for Law Enforcement Act (CALEA)
  • 7.4 Encryption and the All Writs Act