ORPP logo
Image from Google Jackets

The Manager's Guide to Cybersecurity Law : Essentials for Today's Business.

By: Contributor(s): Material type: TextTextSeries: A Rothstein Publishing Collection EBook SeriesPublisher: Brooksfield : Rothstein Associates, Incorporated, 2017Copyright date: ©2016Edition: 1st edDescription: 1 online resource (165 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781944480318
Genre/Form: Additional physical formats: Print version:: The Manager's Guide to Cybersecurity LawLOC classification:
  • HF5548.37
Online resources:
Contents:
Cover -- Title page -- Copyright -- Dedication -- Table of Contents -- Foreword -- Preface -- Chapter 1: Introduction to Cybersecurity Law -- 1.1 Infamous Cybercrimes -- 1.2 Civil vs. Criminal Cybersecurity Offenses -- 1.2.1 Clarifying the Definition of Cybercrime -- 1.2.2 Challenging Your Current Definition of Cybercrime -- 1.2.3 Creating a Strong Cybercrime Definition -- 1.2.4 Cybercrime Categories in the Incident Response Plan -- 1.3 Understanding the Four Basic Elements of Criminal Law -- 1.3.1 Mens Rea -- 1.3.2 Actus Reus -- 1.3.3 Concurrence -- 1.3.4 Causation -- 1.4 Branches of Law -- 1.5 Tort Law -- 1.5.1 Cyber Tort -- 1.5.2 Strict Liability Tort -- 1.5.3 Tort Precedents -- 1.6 Cyberlaw Enforcement -- 1.6.1 Regulatory Enforcement -- 1.6.2 Local Enforcement -- 1.6.3 State Enforcement -- 1.6.3.1 Computer Crime Cases -- 1.6.3.2 Data Breach Cases -- 1.6.4 Federal Enforcement -- 1.6.5 International Enforcement -- 1.7 Cybersecurity Law Jurisdiction -- 1.7.1 Challenging Jurisdiction -- 1.7.2 Extradition -- 1.8 Cybercrime and Cyber Tort Punishment -- 1.8.1 Cybercrime Punishment -- 1.8.2 Cyber Tort Punishment -- References -- Chapter 2: Overview of US Cybersecurity Law -- 2.1 Brief History of Resolving Cybersecurity Disputes -- 2.1.1 Computer Crime Laws in the Public Sector -- 2.1.2 Computer Crime Laws in the Private Sector -- 2.1.3 Application of Laws to Cybersecurity -- 2.2 Resolving Cybersecurity Disputes Outside of Court -- 2.2.1 Cybersecurity Case Mediation Law -- 2.2.2 Cybersecurity Case Arbitration Law -- 2.2.3 Cybersecurity Case Dispositive Motion Law -- 2.2.4 Cybersecurity Case Summary Judgments -- 2.3 Duty of Care Doctrine -- 2.3.1 Duty to Provide Reasonable Security -- 2.3.2 Duty to Reveal Security Breaches -- 2.3.3 Duty to Accurately Disclose Safeguards -- 2.3.4 Duty to Protect Information -- 2.3.5 State-Based Duty of Care Laws.
2.4 Failure to Act Doctrine -- 2.4.1 Failure to Act Duty -- 2.4.2 Failure to Warn Duty -- 2.4.3 Cybersecurity Good Samaritan Law -- 2.5 Reasonable Person Doctrine -- 2.6 Criminal Cyberlaw -- 2.6.1 Cybercrime Penalties -- 2.7 Federal Computer Crime Statutes -- 2.7.1 Significant Federal Laws Addressing Computer Security -- 2.7.2 The US Code -- 2.8 Procedural Law -- 2.8.1 Rules of Criminal Procedure -- 2.8.2 Rules of Civil Procedure (Cyber Tort) -- 2.9 State Computer Crime Laws -- References -- Chapter 3: Cyber Privacy and Data Protection Law -- 3.1 Common Law of Privacy -- 3.2 Privacy Laws -- 3.2.1 Children's Privacy Laws -- 3.2.1.1 Federal Children's Privacy Law -- 3.2.1.2 State Children's Privacy Laws -- 3.2.2 Healthcare Data Privacy Laws -- 3.2.2.1 HIPAA Privacy Rule -- 3.2.2.1.1 Law Enforcement HIPAA Disclosur -- 3.2.2.1.2 HITECH Act -- 3.2.2.1.3 HIPAA Breach Notification Rule -- 3.2.2.2 Veterans Benefits, Health Care, and Information Technology Act -- 3.2.3 Federal Privacy Laws -- 3.2.4 State Privacy Laws -- 3.2.5 International Privacy Laws -- 3.3 Data Breach Laws -- 3.3.1 State Data Breach Laws -- 3.3.2 Federal Data Breach Laws -- 3.3.3 International Data Breach Laws -- 3.4 Data Breach Litigation -- 3.4.1 Injury vs. No-Injury Class Action Lawsuits -- 3.4.2 Data Privacy and the US Supreme Court -- 3.4.2.1 City of Ontario, California, et al. v. Quon -- 3.4.2.2 Campbell-Ewald Co. v. Gomez -- 3.4.2.3 Tyson Foods, Inc. v. Bouaphakeo -- 3.4.3 Shareholder Derivative Lawsuits -- 3.4.4 Securities Fraud Lawsuits -- 3.5 Privacy Notice Law -- 3.6 Personal Liability -- 3.6.1 Directors and Officers Insurance -- 3.6.2 Preemptive Liability Protection -- 3.7 Data Disposal Laws -- 3.8 Electronic Wiretap Laws -- References -- Chapter 4: Cryptography and Digital Forensics Law -- 4.1 Brief Overview of Cryptography -- 4.2 Cryptography Law -- 4.2.1 Export Control Laws.
4.2.2 Import Control Laws -- 4.2.3 Cryptography Patent Infringement -- 4.2.3.1 Patent Trolls -- 4.2.4 Search and Seizure of Encrypted Data -- 4.2.4.1 Digital Search Warrants -- 4.2.4.2 Forgone Conclusion Rule -- 4.2.5 Encryption Personal Use Exemption -- 4.3 State Encryption Laws -- 4.3.1 State Encryption Safe Harbor Provision -- 4.4 Fifth Amendment and Data Encryption -- 4.5 Laws and Regulations Requiring Encryption -- 4.6 International Cryptography Law Perspective -- 4.7 International Key Disclosure Law -- 4.8 Legal Aspects of Digital Forensics -- 4.8.1 Preservation Order -- 4.8.2 Digital Best Evidence Rule -- 4.8.3 Digital Chain of Custody -- 4.8.4 Digital Data Admissibility in Court -- 4.8.5 Digital Evidence Spoliation -- 4.8.6 Expert Witnesses -- 4.8.7 Security Consultant Client Privilege -- 4.9 State Digital Forensics Law -- References -- Chapter 5: Future Developments in Cybersecurity Law -- 5.1 Future of Cybersecurity Legislation -- 5.2 Impact of Technology on Cybersecurity Law -- 5.2.1 Legal Implications of the Internet of Things (IoT) -- 5.2.2 Legal Implications of Big Data -- 5.2.3 Legal Implications of the Cloud -- 5.2.4 Legal Implications of Security Testing -- 5.3 Future US Cybersecurity Legislation -- 5.4 US Foreign Policy on Cybersecurity -- 5.5 National Association of Insurance Commissioners (NAIC) ModelCybersecurity Law -- 5.6 Harmonization of International Cybersecurity Laws -- 5.6.1 Cybersecurity Law and Trade Pacts -- 5.6.2 Harmonization of Cybersecurity and Privacy Law -- 5.7 Trans-Pacific Partnership (TPP) Cybersecurity Framework -- 5.8 Aligning the Law of the Sea to Cybersecurity Law -- 5.9 Cybersecurity Law in Outer Space -- 5.10 The Law of Armed Conflict in Cyberwar -- 5.11 North Atlanta Treaty Organization (NATO) Cyberlaw Stance -- 5.12 United Nations - Universal Cybersecurity Legal Framework.
5.13 International Treaties on Cybersecurity -- 5.14 Brexit Impact on European Union Cybersecurity Law -- 5.15 G7 Perspective on Cybercrime -- References -- Chapter 6: Creating a Cybersecurity Law Program -- 6.1 Cybersecurity Law Program -- 6.1.1 Model -- 6.1.1.1 Components -- 6.1.1.2 Subcomponents -- 6.1.2 Architecture -- 6.1.3 Program Staffing and Roles -- 6.1.3.1 Accountability Matrix -- 6.1.4 Program Policies -- 6.1.5 Program Procedures -- 6.1.6 Program Technology -- 6.1.6.1 eDiscovery Software -- 6.1.6.2 Program Knowledgebase -- 6.1.6.3 Legal and Regulatory Update Subscription -- 6.1.6.4 Policy Compliance Scanning -- 6.1.6.5 Forensic Toolkits -- 6.1.7 Mapping Legal Requirements to Controls -- 6.1.8 ISO/IEC 27002 on Compliance Controls -- 6.2 Cyber Liability Insurance -- 6.2.1 Coverage Categories -- 6.2.2 Policy Restrictions -- 6.2.3 Policy Value -- 6.2.4 Policy Cost -- 6.2.5 Policy Claims -- 6.2.6 Policy Claim Disputes -- 6.2.7 Policy Lawsuits -- 6.2.7.1 P.F. Chang's v. Travelers Indemnity Co. -- 6.2.7.2 Recall Total Information Management Inc. v. Federal Insurance Co. -- 6.2.7.3 Retail Ventures v. National Union Fire Insurance Co. -- 6.2.7.4 Travelers Property Casualty Company of America, et al. v. FederalRecovery Services, Inc., et al. -- 6.2.7.5 Universal Am. Corp. v. National Union Fire Ins. Co. -- 6.2.7.6 Zurich Insurance v. Sony -- References -- Appendix A: Useful Checklists and Information -- Table A-1. eDiscovery Software -- Table A-2. Cybercrime Reporting Agencies -- Table A-3. Cyber Tort Readiness Checklist -- Table A-4. Providers of Cyber Liability Insurance -- Table A-5. Research Sources -- Table A-6. Digital Forensics Toolkits -- Table A-7. Cyber Liability Stress Test -- Table A-8. Cybersecurity Law Program Bill of Materials -- About the Author -- Credits.
Summary: In today's litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider's The Manager's Guide to Cybersecurity Law: Essentials for Today's Business, lets you integrate legal issues into your security program.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Title page -- Copyright -- Dedication -- Table of Contents -- Foreword -- Preface -- Chapter 1: Introduction to Cybersecurity Law -- 1.1 Infamous Cybercrimes -- 1.2 Civil vs. Criminal Cybersecurity Offenses -- 1.2.1 Clarifying the Definition of Cybercrime -- 1.2.2 Challenging Your Current Definition of Cybercrime -- 1.2.3 Creating a Strong Cybercrime Definition -- 1.2.4 Cybercrime Categories in the Incident Response Plan -- 1.3 Understanding the Four Basic Elements of Criminal Law -- 1.3.1 Mens Rea -- 1.3.2 Actus Reus -- 1.3.3 Concurrence -- 1.3.4 Causation -- 1.4 Branches of Law -- 1.5 Tort Law -- 1.5.1 Cyber Tort -- 1.5.2 Strict Liability Tort -- 1.5.3 Tort Precedents -- 1.6 Cyberlaw Enforcement -- 1.6.1 Regulatory Enforcement -- 1.6.2 Local Enforcement -- 1.6.3 State Enforcement -- 1.6.3.1 Computer Crime Cases -- 1.6.3.2 Data Breach Cases -- 1.6.4 Federal Enforcement -- 1.6.5 International Enforcement -- 1.7 Cybersecurity Law Jurisdiction -- 1.7.1 Challenging Jurisdiction -- 1.7.2 Extradition -- 1.8 Cybercrime and Cyber Tort Punishment -- 1.8.1 Cybercrime Punishment -- 1.8.2 Cyber Tort Punishment -- References -- Chapter 2: Overview of US Cybersecurity Law -- 2.1 Brief History of Resolving Cybersecurity Disputes -- 2.1.1 Computer Crime Laws in the Public Sector -- 2.1.2 Computer Crime Laws in the Private Sector -- 2.1.3 Application of Laws to Cybersecurity -- 2.2 Resolving Cybersecurity Disputes Outside of Court -- 2.2.1 Cybersecurity Case Mediation Law -- 2.2.2 Cybersecurity Case Arbitration Law -- 2.2.3 Cybersecurity Case Dispositive Motion Law -- 2.2.4 Cybersecurity Case Summary Judgments -- 2.3 Duty of Care Doctrine -- 2.3.1 Duty to Provide Reasonable Security -- 2.3.2 Duty to Reveal Security Breaches -- 2.3.3 Duty to Accurately Disclose Safeguards -- 2.3.4 Duty to Protect Information -- 2.3.5 State-Based Duty of Care Laws.

2.4 Failure to Act Doctrine -- 2.4.1 Failure to Act Duty -- 2.4.2 Failure to Warn Duty -- 2.4.3 Cybersecurity Good Samaritan Law -- 2.5 Reasonable Person Doctrine -- 2.6 Criminal Cyberlaw -- 2.6.1 Cybercrime Penalties -- 2.7 Federal Computer Crime Statutes -- 2.7.1 Significant Federal Laws Addressing Computer Security -- 2.7.2 The US Code -- 2.8 Procedural Law -- 2.8.1 Rules of Criminal Procedure -- 2.8.2 Rules of Civil Procedure (Cyber Tort) -- 2.9 State Computer Crime Laws -- References -- Chapter 3: Cyber Privacy and Data Protection Law -- 3.1 Common Law of Privacy -- 3.2 Privacy Laws -- 3.2.1 Children's Privacy Laws -- 3.2.1.1 Federal Children's Privacy Law -- 3.2.1.2 State Children's Privacy Laws -- 3.2.2 Healthcare Data Privacy Laws -- 3.2.2.1 HIPAA Privacy Rule -- 3.2.2.1.1 Law Enforcement HIPAA Disclosur -- 3.2.2.1.2 HITECH Act -- 3.2.2.1.3 HIPAA Breach Notification Rule -- 3.2.2.2 Veterans Benefits, Health Care, and Information Technology Act -- 3.2.3 Federal Privacy Laws -- 3.2.4 State Privacy Laws -- 3.2.5 International Privacy Laws -- 3.3 Data Breach Laws -- 3.3.1 State Data Breach Laws -- 3.3.2 Federal Data Breach Laws -- 3.3.3 International Data Breach Laws -- 3.4 Data Breach Litigation -- 3.4.1 Injury vs. No-Injury Class Action Lawsuits -- 3.4.2 Data Privacy and the US Supreme Court -- 3.4.2.1 City of Ontario, California, et al. v. Quon -- 3.4.2.2 Campbell-Ewald Co. v. Gomez -- 3.4.2.3 Tyson Foods, Inc. v. Bouaphakeo -- 3.4.3 Shareholder Derivative Lawsuits -- 3.4.4 Securities Fraud Lawsuits -- 3.5 Privacy Notice Law -- 3.6 Personal Liability -- 3.6.1 Directors and Officers Insurance -- 3.6.2 Preemptive Liability Protection -- 3.7 Data Disposal Laws -- 3.8 Electronic Wiretap Laws -- References -- Chapter 4: Cryptography and Digital Forensics Law -- 4.1 Brief Overview of Cryptography -- 4.2 Cryptography Law -- 4.2.1 Export Control Laws.

4.2.2 Import Control Laws -- 4.2.3 Cryptography Patent Infringement -- 4.2.3.1 Patent Trolls -- 4.2.4 Search and Seizure of Encrypted Data -- 4.2.4.1 Digital Search Warrants -- 4.2.4.2 Forgone Conclusion Rule -- 4.2.5 Encryption Personal Use Exemption -- 4.3 State Encryption Laws -- 4.3.1 State Encryption Safe Harbor Provision -- 4.4 Fifth Amendment and Data Encryption -- 4.5 Laws and Regulations Requiring Encryption -- 4.6 International Cryptography Law Perspective -- 4.7 International Key Disclosure Law -- 4.8 Legal Aspects of Digital Forensics -- 4.8.1 Preservation Order -- 4.8.2 Digital Best Evidence Rule -- 4.8.3 Digital Chain of Custody -- 4.8.4 Digital Data Admissibility in Court -- 4.8.5 Digital Evidence Spoliation -- 4.8.6 Expert Witnesses -- 4.8.7 Security Consultant Client Privilege -- 4.9 State Digital Forensics Law -- References -- Chapter 5: Future Developments in Cybersecurity Law -- 5.1 Future of Cybersecurity Legislation -- 5.2 Impact of Technology on Cybersecurity Law -- 5.2.1 Legal Implications of the Internet of Things (IoT) -- 5.2.2 Legal Implications of Big Data -- 5.2.3 Legal Implications of the Cloud -- 5.2.4 Legal Implications of Security Testing -- 5.3 Future US Cybersecurity Legislation -- 5.4 US Foreign Policy on Cybersecurity -- 5.5 National Association of Insurance Commissioners (NAIC) ModelCybersecurity Law -- 5.6 Harmonization of International Cybersecurity Laws -- 5.6.1 Cybersecurity Law and Trade Pacts -- 5.6.2 Harmonization of Cybersecurity and Privacy Law -- 5.7 Trans-Pacific Partnership (TPP) Cybersecurity Framework -- 5.8 Aligning the Law of the Sea to Cybersecurity Law -- 5.9 Cybersecurity Law in Outer Space -- 5.10 The Law of Armed Conflict in Cyberwar -- 5.11 North Atlanta Treaty Organization (NATO) Cyberlaw Stance -- 5.12 United Nations - Universal Cybersecurity Legal Framework.

5.13 International Treaties on Cybersecurity -- 5.14 Brexit Impact on European Union Cybersecurity Law -- 5.15 G7 Perspective on Cybercrime -- References -- Chapter 6: Creating a Cybersecurity Law Program -- 6.1 Cybersecurity Law Program -- 6.1.1 Model -- 6.1.1.1 Components -- 6.1.1.2 Subcomponents -- 6.1.2 Architecture -- 6.1.3 Program Staffing and Roles -- 6.1.3.1 Accountability Matrix -- 6.1.4 Program Policies -- 6.1.5 Program Procedures -- 6.1.6 Program Technology -- 6.1.6.1 eDiscovery Software -- 6.1.6.2 Program Knowledgebase -- 6.1.6.3 Legal and Regulatory Update Subscription -- 6.1.6.4 Policy Compliance Scanning -- 6.1.6.5 Forensic Toolkits -- 6.1.7 Mapping Legal Requirements to Controls -- 6.1.8 ISO/IEC 27002 on Compliance Controls -- 6.2 Cyber Liability Insurance -- 6.2.1 Coverage Categories -- 6.2.2 Policy Restrictions -- 6.2.3 Policy Value -- 6.2.4 Policy Cost -- 6.2.5 Policy Claims -- 6.2.6 Policy Claim Disputes -- 6.2.7 Policy Lawsuits -- 6.2.7.1 P.F. Chang's v. Travelers Indemnity Co. -- 6.2.7.2 Recall Total Information Management Inc. v. Federal Insurance Co. -- 6.2.7.3 Retail Ventures v. National Union Fire Insurance Co. -- 6.2.7.4 Travelers Property Casualty Company of America, et al. v. FederalRecovery Services, Inc., et al. -- 6.2.7.5 Universal Am. Corp. v. National Union Fire Ins. Co. -- 6.2.7.6 Zurich Insurance v. Sony -- References -- Appendix A: Useful Checklists and Information -- Table A-1. eDiscovery Software -- Table A-2. Cybercrime Reporting Agencies -- Table A-3. Cyber Tort Readiness Checklist -- Table A-4. Providers of Cyber Liability Insurance -- Table A-5. Research Sources -- Table A-6. Digital Forensics Toolkits -- Table A-7. Cyber Liability Stress Test -- Table A-8. Cybersecurity Law Program Bill of Materials -- About the Author -- Credits.

In today's litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations, you may not be a legal expert. Fortunately, in a few hours of reading, rather than months of classroom study, Tari Schreider's The Manager's Guide to Cybersecurity Law: Essentials for Today's Business, lets you integrate legal issues into your security program.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.