International Cybersecurity and Privacy Law in Practice

International Cybersecurity and Privacy Law in Practice
ISBN-10
904118841X
ISBN-13
9789041188410
Category
Computers
Pages
448
Language
English
Published
2017-12-04
Publisher
Kluwer Law International
Author
Charlotte A. Tschider

Description

International Cybersecurity and Privacy Law in Practice balances privacy and cybersecurity legal knowledge with technical knowledge and business acumen needed to provide adequate representation and consultation both within an organization, such as a government entity or business, and when advising these organizations as external counsel. Although organizations collect information, including personal data, in increasing volume, they often struggle to identify privacy laws applicable to complex, multinational technology implementations. Jurisdictions worldwide now include specific cybersecurity obligations in privacy laws and have passed stand-alone cybersecurity laws. To advise on these compliance matters, attorneys must understand both the law and the technology to which it applies. This book provides an innovative, in-depth survey and analysis of international information privacy and cybersecurity laws worldwide, an introduction to cybersecurity technology, and a detailed guide on organizational practices to protect an organization's interests and anticipate future compliance developments. It also introduces cybersecurity industry standards, developing cybersecurity legal developments, and international data localization laws. What's in this book: This book explores international information privacy laws applicable to private and public organizations, including employment and marketing-related compliance requirements and industry-specific guidance. It introduces a legal approach based on industry best practices to creating and managing an effective cybersecurity and privacy program that includes the following and more: prompt, secure ways to identify threats, manage vulnerabilities, and respond to "incidents"; defining the accountability of the "data controller" within an organization; roles of transparency and consent; privacy notice as contract; rights of revocation, erasure, and correction; de-identification and anonymization procedures; records retention; and data localization. Regulations and applicable "soft law" will be explored in detail for a wide variety of jurisdictions, including an introduction to the European Union's Global Data Protection Regulation (GDPR), China's Cybersecurity Law, the OECD and APEC Guidelines, the U.S. Health Insurance Portability and Accountability Act (HIPAA), and many other national and regional instruments. How this will help you: This book is an indispensable resource for attorneys who must advise on strategic implementation of new technologies, advise on the impact of certain laws to the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities. It will also be of value to other practitioners from a broader perspective, such as compliance and security personnel, who need a reference exploring privacy and data protection laws and their connection with security technologies.

Other editions

Similar books

  • Family History Digital Libraries
    By William Sims Bainbridge

    One named Sara and Timberlake had 11 male workers, 1 female worker, and 4 children workers, so it might have employed the Minor family.

  • Foundation Dreamweaver MX
    By Craig Grannell, Jerome Turner, Matt Stephens

    So here's what we need to do to arrive at our layout: s Create the main table to hold all the page elements. s Deal with the navigation area which is ...

  • Cisco CCNA Certification, 2 Volume Set: Exam 200-301
    By Todd Lammle

    This inclusive, two-book set provides what you need to know to succeed on the new CCNA exam. The set includes Understanding Cisco Networking Technologies: Volume 1 and the CCNA Certification Study Guide: Volume 2.

  • CompTIA Network+ Study Guide: Exam N10-006
    By Todd Lammle

    ... you can use: –a –A –c –n –r –R –S –s All nbtstat switches are case sensitive. Generally speaking, lowercase switches deal with NetBIOS names of hosts, ...

  • CompTIA Network+ Study Guide with Online Labs: N10-007 Exam
    By Todd Lammle, Jon Buhagiar

    ... you can use: –a –A –c –n –r –R –S –s All nbtstat switches are case sensitive. Generally speaking, lowercase switches deal with NetBIOS names of hosts, ...

  • CCNA: Cisco Certified Network Associate FastPass
    By Todd Lammle

    S The S reference point defines the point between the customer router and an ... with the letter E deal with using ISDN on the existing telephone network.

  • Stranger in the Chat Room
    By Todd Hafer, Jedd Hafer

    A sequel to In the Chat Room With God finds a group of teens contacted by a mysterious and increasingly malevolent character who claims to know about their encounters with the Almighty and challenges their beliefs. Original.

  • Error Correction Coding: Mathematical Methods and Algorithms
    By Todd K. Moon

    M M−1∑ k=0 −∞ ∞ k=0 The average energy per signal E s ∫ can be related to the ... we will deal primarily with additive white Gaussian noise (AWGN), ...

  • Security+ Training Guide
    By Todd King

    ... to deal with most , but unfortunately not all , of these potential threats . ... The S / MIME standard implements encryption for message content using ...

  • CCDA: Cisco Certified Design Associate Study Guide: Exam 640-861
    By Todd Lammle, Andy Barkl

    S reference point The S reference point defines the reference point between ... with the letter E deal with using ISDN on the existing telephone network.