"Ord #14648."--Spine Prepared for distribution at the program of the same name, held June-July 2008, in San Francisco and live webcast, New York City, and Chicago. Index begins with letter B and is erratic. Includes bibliographical references and index.
Contents:
Understanding PCI & ITS application (PowerPoint) / The emerging law of data security: a focus on the legal trends / William J. Cook Security breach notification: the full risk perspective / Jody R. Westby -- A primer on key information security laws in the United States / John B. Kennedy -- A guide to safeguarding employee personal data / Matthew H. Meade -- The emerging law of data security: from corporate obligations to provide security to breach notification requirements / Lisa M. Thomas -- The law of workplace privacy: U.S. and global developments -- What every U.S. employer should know about workplace privacy: part one / Lisa J. Sotto, Elisabeth M. McCarthy -- What every U.S. employer should know about workplace privacy: part two / Lisa J. Sotto, Elisabeth M. McCarthy -- A how-to guide to information security breaches / Lisa J. Sotto, Aaron P. Simpson -- Data breach! Correct response crucial / Lisa J. Sotto, John W. Woods Jr., John J. Delionado -- Key U.S. laws regulating workplace privacy / Christine E. Lyon -- The continuing expansion of data-specific privacy and security rules and regulations -- dt Continuing the expansion of data-specific privacy and security rules and regulations: restrictions on the use of social security numbers & impact of credit freeze legislation / Pete McCorkell -- The continuing expansion of data-specific data-specific privacy and security rules and regulations / Maureen A. Young -- 2008 update: the continuing expansion of data-specific privacy and security rules and regulations / Christopher Wolf -- Across the pond: recent developments in eu data protection laws, regulation and enforcement -- Monitoring employees under the Luxembourg data protection law / Francoise Gilbert -- European data protection law: hot topics 2008 / Professor Paul M. Schwartz -- Across the pond: recent developments in eu data protection laws, regulation and enforcement / Ruth Hill Bro -- Beyond the eu: privacy and security law developments of interest to U.S. companies doing business overseas -- Privacy law: international data protection developments / Miriam Wugmeister, Christine E. Lyon -- Beyond eu: privacy and security law developments of interest to U.S. companies doing business overseas / Anoop Narayanan -- Information privacy in the Asia-Pacific region and Canada: recent legislative, regulatory and policy developments / Jeff Rohlmeier -- The cpo's speak: best practices for managing privacy and security risks in a changing regulatory environment -- Best practices for managing privacy and security risks in a changing regulatory environment / Jill A. Phillips -- The CPO's speak: Best practices for managing privacy and security risks in a changing regulatory environment / Lynn A. Goldstein -- Conducting information privacy risk assessments / Vincent Serpico, Holly Manley -- Beacons, bugs and pixel tags: Do you comply with the behavioral marketing requirements? A comparative analysis of the us and eu regimes / Francoise Gilbert -- Practicing what we preach: current issues in information management, legal practice and legal ethics -- Practicing what we preach: current issues in information management, legal practice and legal ethics, March 31, 2008 / Merri A. Baldwin, Kathryn J. Fritz -- Practicing what we preach: current issues in information management, legal practice and legal ethics / Maura R. Grossman -- Risky business: e-mail at work for personal purposes / Jeremy R. Feinberg, Maura RGrossman -- Practicing what we preach: current issues in information management, legal practice and legal ethics / John P. Hutchins -- Privacy in litigation: responding to government and civil litigant requests for personal information / James Chadwick -- Privacy issues in litigation: Responding to the government's request for personal information / Kevin P. Mullen -- What do you do when the government calls? Risks and responsibilities in responding to b=government requests for data / Ronald D. Lee -- Beyond the "war" on terrorism: towards the new intelligence network / Ronald D. Lee, Professor Paul M. Schwartz -- Foreign Intelligence Surveillance Act (FISA) / Andrew B. Serwin -- Table of contents from information security and privacy: a practical guide to federal, state and international law / Andrew B. Serwin -- Privacy and security risks in online marketing and advertising: current events in search data collection and retention / Eve Chaurand-Fraser -- Coppa & the protection of children's privacy on-line / Roselyn J. Kitchen -- Behavioral targeting / D. Reed Freeman Jr., Christopher M. Loeffler -- Can-spam / D. Reed Freeman Jr., Christopher M. Loeffler -- Protecting data: security, minimization and anonymization / Michael Hintze -- User generated content: potential protections available to web site operators under the Communications Decency Act and Digital Millennium Copyright Act / Justine Young Gottshall, Ryan Sulkin, Patrick Mueller -- Privacy and wireless marketing / Justine Young Gottshall, Ryan Sulkin -- Implementing security standards: What businesses need to know about the payment card industry (PCI) data security standard / Stephen S. Wu, James Cowing -- The 'deal' perspective: addressing privacy and security in commercial transactions -- Is your M&A checklist obselete? understanding how data privacy and security affect corporate and commercial transactions / Francoise Gilbert -- Addressing privacy and security issues in commercial transactions / Vivian L. Polak, Jeffrey G. Glaser -- Addressing privacy and security in commercial transactions / Marcelo Halpern -- Privacy and data security in service provider arrangements: recent developments / Jeffrey Taft -- News from the future: what privacy and security law will look like five years from now -- Digital search & seizure: updating privacy protections to keep pace with technology / James Dempsey -- The law of workplace privacy: recent developments (PowerPoint) / John F. Hyland, Katherine L. Kettler -- Law of workplace privacy: U.S. & global developments (PowerPoint) / Lisa J. Sotto, J. Andrew Heaton -- The law of workplace privacy: U.S. & global developments (PowerPoint) / Christine E. Lyon, Frances Wiet -- Data-specific rules: ssns & credit freezes (PowerPoint) / Pete McCorkell -- The continuing expansion of data-specific privacy and security rules and regulations (PowerPoint) / Christopher Wolf -- European data protection Law: hot topics 2008 (PowerPoint) / Professor Paul M. Schwartz -- Eu-US data privacy safe harbor update (PowerPoint) / Professor Lothar Determann, Professor Paul M. Schwartz -- Best practices for managing privacy and security risks in a changing regulatory environment (PowerPoint) / Jill A. Phillips -- What do you do when the government calls? Risks and responsibilities in responding to government requests for data (PowerPoint) / Ronald D. Lee -- What businesses need to know about the payment card industry (PCI) security standard (PowerPoint) / Stephen S. Wu, James Cowing -- Understanding PCI & ITS application (PowerPoint) / William J. Cook
Series:
Intellectual property course handbook series ; nos. G-934- G-935
This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.