|
Pris: 2598 SEK exkl. moms | International Cybersecurity and Privacy Law in Practice, currently in its second edition, is a crucial book—which has now been extensively updated to reflect the dramatic legal changes that have taken place in the few short years since its first edition—remains the prominent in-depth survey and analysis of privacy and cybersecurity laws globally. As jurisdictions increasingly pass new cybersecurity and privacy laws, attorneys must secure a working knowledge of information technology to effectively advise organizations that collect and process data. This essential book also furnishes a deeply informed guide on how to apply legal requirements to protect an organization’s interests and anticipate future compliance developments.
What’s in this book:
With meticulous attention to relevant supranational, regional, and national privacy and data protection laws and frameworks, the author describes and analyzes the legal strategies and responsibilities attached to the following and more:
- prompt, secure ways to identify threats, manage vulnerabilities, and respond to “incidents” and data breaches;
- most common types of cyberattacks used today;
- transparency and consent;
- rights of revocation, erasure, and correction;
- de-identification and anonymization procedures;
- data localization;
- cross-jurisdictional data transfer;
- contract negotiation;
- encryption, de-identification, anonymization, and pseudonymization; and
- Artificial Intelligence as an emerging technology that will require more dynamic and challenging conversations.
How this will help you:
Balancing legal knowledge with technical awareness and business acumen, this book is an indispensable resource for attorneys who must provide advice on strategic implementations of new technologies, advise on the impact of certain laws on the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities. It will also prove invaluable to other practitioners, such as security personnel and compliance professionals, who will benefit from a broad perspective exploring privacy and data protection laws and their connection with security technologies and broader organizational compliance objectives.
Table Of Contents
About the Author
Preface
List of Abbreviations
List of Figures
List of Tables
Acknowledgments
Introduction
PART I
Information Privacy Law and Practice
CHAPTER 1
Introduction to Information Privacy Law and Practice
CHAPTER 2
European Region, European Economic Area, and Canada
CHAPTER 3
United States & Canada
CHAPTER 4
Latin America Region
CHAPTER 5
Asia-Pacific Region
CHAPTER 6
The Middle East and Africa
CHAPTER 7
Privacy Programs and Practical Strategies
PART II
Cybersecurity Law and Practice
CHAPTER 8
Introduction to Cybersecurity and Information Technology
CHAPTER 9
Security Technologies
CHAPTER 10
Cybersecurity Statutory Obligations
CHAPTER 11
Information Security Programs and Practical Strategies
CHAPTER 12
Security Process Development
CHAPTER 13
Incident Response and Attack Types
PART III
Managing Privacy and Security Legal Risk
CHAPTER 14
Managing Legal Risk
CHAPTER 15
Data Breach Notification
Index | |
|