TY - BOOK AU - Mireles,Michael S. AU - Hobaugh,Jack L. TI - Principles of cybersecurity law T2 - Concise hornbook series SN - 9781636590202 AV - KF1263.C65 M57 2021 U1 - 343.0999 23 PY - 2021///] CY - St. Paul, MN PB - West Academic Publishing KW - Data protection KW - Law and legislation KW - United States KW - Computer security KW - Computer networks KW - Security measures KW - Privacy, Right of KW - R�eseaux d'ordinateurs KW - S�ecurit�e KW - Mesures KW - �Etats-Unis KW - fast KW - examination study guides KW - aat KW - Hornbooks (Law) KW - Study guides KW - lcgft KW - Manuels d'enseignement sup�erieur (Droit) KW - rvmgf KW - Guides de l'�etudiant N1 - Includes bibliographical references and index; Federal Trade Commission enforcement and cybersecurity law -- The Gramm-Leach-Bliley Act and FTC safeguards rule -- U.S. Securities and Exchange Commission cybersecurity -- Health Insurance Portability and Accountability Act -- Family Education Rights and Privacy Act -- State cybersecurity laws -- Additional private causes of action for cybersecurity breaches -- Cybersecurity risk assessment and National Institute of Standards and Technology risk management framework -- Laws prohibiting and addressing hacking -- Internet of things -- An international perspective N2 - "This book is for anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based 'reasonable security measures' frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues"--Publisher's description ER -