The Locator -- [(title = "Across the pond")]

18 records matched your query       


Record 9 | Previous Record | MARC Display | Next Record | Search Results
Author:
Institute on Privacy and Security Law (9th : 2008)
Title:
Ninth annual institute on privacy and security law / co-chairs, Francoise Gilbert ... [et al.].
Publisher:
Practising Law Institute,
Copyright Date:
c2008
Description:
2 v. : ill., ports., forms ; 23 cm.
Subject:
Privacy, Right of.
Data protection.
Records--Access control.
Electronic data interchange.
Freedom of information.
Computer security.
Security, International.
Terrorism--Prevention.
Web sites.
United States.--Foreign Intelligence Surveillance Act of 1978.
United States.--Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003.
United States.--Communications Decency Act of 1996.
United States.--Digital Millennium Copyright Act.
Governmental investigations.
Disclosure of information.
Supervision of employees.
Employee rights.
Electronic surveillance.
Electronic mail systems.
Freedom of speech.
Computer networks.
Electronic commerce--Security measures.
Privacy, Right of--European Union countries.
Data protection--European Union countries.
Privacy, Right of--Latin America.
Credit cards.
Consolidation and merger of corporations.
Other Authors:
Gilbert, Francoise.
Practising Law Institute.
Notes:
"Ord #14648."--Spine Prepared for distribution at the program of the same name, held June-July 2008, in San Francisco and live webcast, New York City, and Chicago. Index begins with letter B and is erratic. Includes bibliographical references and index.
Contents:
Understanding PCI & ITS application (PowerPoint) / The emerging law of data security: a focus on the legal trends / William J. Cook Security breach notification: the full risk perspective / Jody R. Westby -- A primer on key information security laws in the United States / John B. Kennedy -- A guide to safeguarding employee personal data / Matthew H. Meade -- The emerging law of data security: from corporate obligations to provide security to breach notification requirements / Lisa M. Thomas -- The law of workplace privacy: U.S. and global developments -- What every U.S. employer should know about workplace privacy: part one / Lisa J. Sotto, Elisabeth M. McCarthy -- What every U.S. employer should know about workplace privacy: part two / Lisa J. Sotto, Elisabeth M. McCarthy -- A how-to guide to information security breaches / Lisa J. Sotto, Aaron P. Simpson -- Data breach! Correct response crucial / Lisa J. Sotto, John W. Woods Jr., John J. Delionado -- Key U.S. laws regulating workplace privacy / Christine E. Lyon -- The continuing expansion of data-specific privacy and security rules and regulations -- dt Continuing the expansion of data-specific privacy and security rules and regulations: restrictions on the use of social security numbers & impact of credit freeze legislation / Pete McCorkell -- The continuing expansion of data-specific data-specific privacy and security rules and regulations / Maureen A. Young -- 2008 update: the continuing expansion of data-specific privacy and security rules and regulations / Christopher Wolf -- Across the pond: recent developments in eu data protection laws, regulation and enforcement -- Monitoring employees under the Luxembourg data protection law / Francoise Gilbert -- European data protection law: hot topics 2008 / Professor Paul M. Schwartz -- Across the pond: recent developments in eu data protection laws, regulation and enforcement / Ruth Hill Bro -- Beyond the eu: privacy and security law developments of interest to U.S. companies doing business overseas -- Privacy law: international data protection developments / Miriam Wugmeister, Christine E. Lyon -- Beyond eu: privacy and security law developments of interest to U.S. companies doing business overseas / Anoop Narayanan -- Information privacy in the Asia-Pacific region and Canada: recent legislative, regulatory and policy developments / Jeff Rohlmeier -- The cpo's speak: best practices for managing privacy and security risks in a changing regulatory environment -- Best practices for managing privacy and security risks in a changing regulatory environment / Jill A. Phillips -- The CPO's speak: Best practices for managing privacy and security risks in a changing regulatory environment / Lynn A. Goldstein -- Conducting information privacy risk assessments / Vincent Serpico, Holly Manley -- Beacons, bugs and pixel tags: Do you comply with the behavioral marketing requirements? A comparative analysis of the us and eu regimes / Francoise Gilbert -- Practicing what we preach: current issues in information management, legal practice and legal ethics -- Practicing what we preach: current issues in information management, legal practice and legal ethics, March 31, 2008 / Merri A. Baldwin, Kathryn J. Fritz -- Practicing what we preach: current issues in information management, legal practice and legal ethics / Maura R. Grossman -- Risky business: e-mail at work for personal purposes / Jeremy R. Feinberg, Maura RGrossman -- Practicing what we preach: current issues in information management, legal practice and legal ethics / John P. Hutchins -- Privacy in litigation: responding to government and civil litigant requests for personal information / James Chadwick -- Privacy issues in litigation: Responding to the government's request for personal information / Kevin P. Mullen -- What do you do when the government calls? Risks and responsibilities in responding to b=government requests for data / Ronald D. Lee -- Beyond the "war" on terrorism: towards the new intelligence network / Ronald D. Lee, Professor Paul M. Schwartz -- Foreign Intelligence Surveillance Act (FISA) / Andrew B. Serwin -- Table of contents from information security and privacy: a practical guide to federal, state and international law / Andrew B. Serwin -- Privacy and security risks in online marketing and advertising: current events in search data collection and retention / Eve Chaurand-Fraser -- Coppa & the protection of children's privacy on-line / Roselyn J. Kitchen -- Behavioral targeting / D. Reed Freeman Jr., Christopher M. Loeffler -- Can-spam / D. Reed Freeman Jr., Christopher M. Loeffler -- Protecting data: security, minimization and anonymization / Michael Hintze -- User generated content: potential protections available to web site operators under the Communications Decency Act and Digital Millennium Copyright Act / Justine Young Gottshall, Ryan Sulkin, Patrick Mueller -- Privacy and wireless marketing / Justine Young Gottshall, Ryan Sulkin -- Implementing security standards: What businesses need to know about the payment card industry (PCI) data security standard / Stephen S. Wu, James Cowing -- The 'deal' perspective: addressing privacy and security in commercial transactions -- Is your M&A checklist obselete? understanding how data privacy and security affect corporate and commercial transactions / Francoise Gilbert -- Addressing privacy and security issues in commercial transactions / Vivian L. Polak, Jeffrey G. Glaser -- Addressing privacy and security in commercial transactions / Marcelo Halpern -- Privacy and data security in service provider arrangements: recent developments / Jeffrey Taft -- News from the future: what privacy and security law will look like five years from now -- Digital search & seizure: updating privacy protections to keep pace with technology / James Dempsey -- The law of workplace privacy: recent developments (PowerPoint) / John F. Hyland, Katherine L. Kettler -- Law of workplace privacy: U.S. & global developments (PowerPoint) / Lisa J. Sotto, J. Andrew Heaton -- The law of workplace privacy: U.S. & global developments (PowerPoint) / Christine E. Lyon, Frances Wiet -- Data-specific rules: ssns & credit freezes (PowerPoint) / Pete McCorkell -- The continuing expansion of data-specific privacy and security rules and regulations (PowerPoint) / Christopher Wolf -- European data protection Law: hot topics 2008 (PowerPoint) / Professor Paul M. Schwartz -- Eu-US data privacy safe harbor update (PowerPoint) / Professor Lothar Determann, Professor Paul M. Schwartz -- Best practices for managing privacy and security risks in a changing regulatory environment (PowerPoint) / Jill A. Phillips -- What do you do when the government calls? Risks and responsibilities in responding to government requests for data (PowerPoint) / Ronald D. Lee -- What businesses need to know about the payment card industry (PCI) security standard (PowerPoint) / Stephen S. Wu, James Cowing -- Understanding PCI & ITS application (PowerPoint) / William J. Cook
Series:
Intellectual property course handbook series ; nos. G-934- G-935
ISBN:
1402410670
9781402410673
Locations:
OVUX522 -- University of Iowa Libraries (Iowa City)
N5UX522 -- University of Iowa Law Library (Iowa City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.