| 000 | 05043cam a2200709 i 4500 | ||
|---|---|---|---|
| 001 | on1260664221 | ||
| 003 | OCoLC | ||
| 005 | 20230828121007.0 | ||
| 008 | 210720t20212021mnua b 001 0 eng c | ||
| 040 |
_aYDX _beng _cYDX _dUKMGB _dWVU _dBDX _dOCLCO _dXND _dGWL _dTLK _dTXQ _dOCLCF _dOCLCO _dUTV _dOCLCA _dOCLCO |
||
| 015 |
_aGBC1B8168 _2bnb |
||
| 016 | 7 |
_a020272508 _2Uk |
|
| 019 | _a1263877905 | ||
| 020 |
_a9781636590202 _q(paperback) |
||
| 020 |
_a1636590209 _q(paperback) |
||
| 020 |
_z9781636595474 _q(electronic book) |
||
| 020 |
_z1636595472 _q(electronic book) |
||
| 029 | 1 |
_aUKMGB _b020272508 |
|
| 035 |
_a(OCoLC)1260664221 _z(OCoLC)1263877905 |
||
| 042 | _apcc | ||
| 043 | _an-us--- | ||
| 050 | 4 |
_aKF1263.C65 _bM57 2021 |
|
| 082 | 0 | 4 |
_a343.0999 _223 |
| 049 | _aTZAA | ||
| 100 | 1 |
_aMireles, Michael S. _q(Michael Salomon), _eauthor. |
|
| 245 | 1 | 0 |
_aPrinciples of cybersecurity law / _cMichael S. Mireles, Jack L. Hobaugh, Jr. |
| 246 | 1 | 8 | _aCybersecurity law |
| 246 | 3 | _aPrinciples of cyber security law | |
| 264 | 1 |
_aSt. Paul, MN : _bWest Academic Publishing, _c[2021] |
|
| 264 | 4 | _c�2021 | |
| 300 |
_ax, 239 pages : _billustrations ; _c24 cm. |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 490 | 1 | _aConcise hornbook series | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aFederal Trade Commission enforcement and cybersecurity law -- The Gramm-Leach-Bliley Act and FTC safeguards rule -- U.S. Securities and Exchange Commission cybersecurity -- Health Insurance Portability and Accountability Act -- Family Education Rights and Privacy Act -- State cybersecurity laws -- Additional private causes of action for cybersecurity breaches -- Cybersecurity risk assessment and National Institute of Standards and Technology risk management framework -- Laws prohibiting and addressing hacking -- Internet of things -- An international perspective. | |
| 520 | _a"This book is for anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based 'reasonable security measures' frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, anti-hacking related laws and some international issues"--Publisher's description. | ||
| 650 | 0 |
_aData protection _xLaw and legislation _zUnited States. |
|
| 650 | 0 |
_aComputer security _xLaw and legislation _zUnited States. |
|
| 650 | 0 |
_aComputer networks _xSecurity measures _zUnited States. |
|
| 650 | 0 |
_aPrivacy, Right of _zUnited States. |
|
| 650 | 6 |
_aR�eseaux d'ordinateurs _0(CaQQLa)201-0263812 _xS�ecurit�e _0(CaQQLa)201-0263812 _xMesures _0(CaQQLa)201-0263812 _z�Etats-Unis. _0(CaQQLa)201-0407727 |
|
| 650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
| 650 | 7 |
_aComputer security _xLaw and legislation. _2fast _0(OCoLC)fst00872492 |
|
| 650 | 7 |
_aData protection _xLaw and legislation. _2fast _0(OCoLC)fst00887963 |
|
| 650 | 7 |
_aPrivacy, Right of. _2fast _0(OCoLC)fst01077444 |
|
| 651 | 7 |
_aUnited States. _2fast _0(OCoLC)fst01204155 |
|
| 655 | 7 |
_aexamination study guides. _2aat _0(CStmoGRI)aatgf300026368 |
|
| 655 | 7 |
_aHornbooks (Law) _2fast _0(OCoLC)fst01774270 |
|
| 655 | 7 |
_aStudy guides. _2fast _0(OCoLC)fst01423888 |
|
| 655 | 7 |
_aHornbooks (Law) _2lcgft |
|
| 655 | 7 |
_aStudy guides. _2lcgft |
|
| 655 | 7 |
_aManuels d'enseignement sup�erieur (Droit) _2rvmgf _0(CaQQLa)RVMGF-000001905 |
|
| 655 | 7 |
_aGuides de l'�etudiant. _2rvmgf _0(CaQQLa)RVMGF-000001278 |
|
| 700 | 1 |
_aHobaugh, Jack L., _cJr., _eauthor. |
|
| 776 | 0 | 8 |
_iOnline version: _aMireles, Michael Salomon. _tPrinciples of cybersecurity law. _dSt. Paul, MN : West Academic Publishing, [2021] _z9781636595474 _w(OCoLC)1261049990 |
| 830 | 0 |
_aConcise hornbook series. _92474 |
|
| 938 |
_aBrodart _bBROD _n130317624 |
||
| 938 |
_aYBP Library Services _bYANK _n17545880 |
||
| 994 |
_aC0 _bTZACH |
||
| 999 |
_c7102 _d7102 |
||