Amazon cover image
Image from Amazon.com

Principles of cybersecurity law / Michael S. Mireles, Jack L. Hobaugh, Jr.

By: Contributor(s): Material type: TextSeries: Concise hornbook seriesPublisher: St. Paul, MN : West Academic Publishing, [2021]Copyright date: �2021Description: x, 239 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781636590202
  • 1636590209
Other title:
  • Cybersecurity law [Spine title]
  • Principles of cyber security law
Subject(s): Genre/Form: Additional physical formats: Online version:: Principles of cybersecurity law.DDC classification:
  • 343.0999 23
LOC classification:
  • KF1263.C65 M57 2021
Contents:
Federal Trade Commission enforcement and cybersecurity law -- The Gramm-Leach-Bliley Act and FTC safeguards rule -- U.S. Securities and Exchange Commission cybersecurity -- Health Insurance Portability and Accountability Act -- Family Education Rights and Privacy Act -- State cybersecurity laws -- Additional private causes of action for cybersecurity breaches -- Cybersecurity risk assessment and National Institute of Standards and Technology risk management framework -- Laws prohibiting and addressing hacking -- Internet of things -- An international perspective.
Summary: "This book is for anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based 'reasonable security measures' frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues"--Publisher's description.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Includes bibliographical references and index.

Federal Trade Commission enforcement and cybersecurity law -- The Gramm-Leach-Bliley Act and FTC safeguards rule -- U.S. Securities and Exchange Commission cybersecurity -- Health Insurance Portability and Accountability Act -- Family Education Rights and Privacy Act -- State cybersecurity laws -- Additional private causes of action for cybersecurity breaches -- Cybersecurity risk assessment and National Institute of Standards and Technology risk management framework -- Laws prohibiting and addressing hacking -- Internet of things -- An international perspective.

"This book is for anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based 'reasonable security measures' frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues"--Publisher's description.

There are no comments on this title.

to post a comment.

African Court on Human and Peoples' Rights | For Inquiries Contact » +255 272 510 510