The Locator -- [(subject = "Privacy Right of")]

2315 records matched your query       


Record 1 | Previous Record | MARC Display | Next Record | Search Results
Author:
Mireles, Michael S. (Michael Salomon), author.
Title:
Principles of cybersecurity law / Michael S. Mireles, Jack L. Hobaugh, Jr.
Edition:
Second edition
Publisher:
West Academic Publishing,
Copyright Date:
2024
Description:
1 volume (various pagings) : illustrations ; 24 cm.
Subject:
Data protection--Law and legislation--United States.
Computer security--Law and legislation--United States.
Computer networks--Security measures--United States.
Privacy, Right of--United States.
Réseaux d'ordinateurs--Mesures--Mesures--États-Unis.
Computer networks--Security measures.
Computer security--Law and legislation.
Data protection--Law and legislation.
Privacy, Right of.
United States
examination study guides.
Hornbooks (Law)
Study guides.
Hornbooks (Law)
Study guides.
Manuels d'enseignement supérieur (Droit)
Guides de l'étudiant.
Other Authors:
Hobaugh, Jack L., Jr. author. https://id.oclc.org/worldcat/entity/E39PCjxRwXtc7cHJYwF67Yx99P
Notes:
Includes bibliographical references and index.
Contents:
Federal Trade Commission enforcement and cybersecurity law -- The Gramm-Leach-Bliley Act and FTC safeguards rule -- U.S. Securities and Exchange Commission cybersecurity -- Health Insurance Portability and Accountability Act -- Family Education Rights and Privacy Act -- State cybersecurity laws -- Additional private causes of action for cybersecurity breaches -- Cybersecurity risk assessment and National Institute of Standards and Technology risk management framework -- Laws prohibiting and addressing hacking -- Internet of things -- An international perspective.
Summary:
"This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based "reasonable security measures" frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, ransomware, anti-hacking related laws and some international issues"--Publisher's description.
Series:
Concise hornbook series
ISBN:
9781685615437
1685615430
OCLC:
(OCoLC)1415842348
Locations:
OVUX522 -- University of Iowa Libraries (Iowa City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.