Cybersecurity and privacy law in a nutshell:
Cybersecurity technology and actors -- Responding to cyber threats -- Computer Fraud and Abuse Act -- State cybercrime laws -- Data breaches -- Identity theft : federal -- State identity theft laws -- Recent changes to federal cybersecurity law -- Cybersecurity and international law -- Privacy theor...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
St. Paul, MN
West Academic Publishing
[2019]
|
Schriftenreihe: | Nutshell series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Zusammenfassung: | Cybersecurity technology and actors -- Responding to cyber threats -- Computer Fraud and Abuse Act -- State cybercrime laws -- Data breaches -- Identity theft : federal -- State identity theft laws -- Recent changes to federal cybersecurity law -- Cybersecurity and international law -- Privacy theory and investigations -- Privacy law and data protection "[This book provides an] overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age."-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XIV, 302 Seiten 19 cm |
ISBN: | 9781634602723 1634602722 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048202971 | ||
003 | DE-604 | ||
005 | 20230921 | ||
007 | t | ||
008 | 220506s2019 xxu |||| 00||| eng d | ||
020 | |a 9781634602723 |c Broschur |9 978-1-63460-272-3 | ||
020 | |a 1634602722 |9 1-63460-272-2 | ||
024 | 3 | |a 9781634602723 | |
035 | |a (DE-599)KXP1679402668 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-M382 | ||
050 | 0 | |a KF390.5.C6 | |
084 | |a 86.28 |2 bkl | ||
084 | |a 86.20 |2 bkl | ||
100 | 1 | |a Kesan, Jay P. |e Verfasser |0 (DE-588)1132357519 |4 aut | |
245 | 1 | 0 | |a Cybersecurity and privacy law in a nutshell |c Jay P. Kesan (University of Illinois at Urbana-Champaign) , Carol M. Hayes (University of Illinois at Urbana-Champaign) |
246 | 1 | 3 | |a Cybersecurity and privacy law |
264 | 1 | |a St. Paul, MN |b West Academic Publishing |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a XIV, 302 Seiten |c 19 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Nutshell series | |
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Cybersecurity technology and actors -- Responding to cyber threats -- Computer Fraud and Abuse Act -- State cybercrime laws -- Data breaches -- Identity theft : federal -- State identity theft laws -- Recent changes to federal cybersecurity law -- Cybersecurity and international law -- Privacy theory and investigations -- Privacy law and data protection | |
520 | 3 | |a "[This book provides an] overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age."-- | |
653 | 0 | |a Computer security / Law and legislation / United States | |
653 | 0 | |a Privacy, Right of / United States | |
700 | 1 | |a Hayes, Carol M. |e Verfasser |4 aut | |
856 | 4 | 2 | |m V:DE-576;B:DE-Frei85 |q application/pdf |u https://swbplus.bsz-bw.de/bsz1679402668inh.htm |v 20210414193225 |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m B:DE-89 |m V:DE-601 |q pdf/application |u https://www.gbv.de/dms/tib-ub-hannover/1679402668.pdf |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033583929 |
Datensatz im Suchindex
_version_ | 1804183969497874432 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kesan, Jay P. Hayes, Carol M. |
author_GND | (DE-588)1132357519 |
author_facet | Kesan, Jay P. Hayes, Carol M. |
author_role | aut aut |
author_sort | Kesan, Jay P. |
author_variant | j p k jp jpk c m h cm cmh |
building | Verbundindex |
bvnumber | BV048202971 |
callnumber-first | K - Law |
callnumber-label | KF390 |
callnumber-raw | KF390.5.C6 |
callnumber-search | KF390.5.C6 |
callnumber-sort | KF 3390.5 C6 |
callnumber-subject | KF - United States |
ctrlnum | (DE-599)KXP1679402668 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02689nam a2200445 c 4500</leader><controlfield tag="001">BV048202971</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230921 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220506s2019 xxu |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781634602723</subfield><subfield code="c">Broschur</subfield><subfield code="9">978-1-63460-272-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1634602722</subfield><subfield code="9">1-63460-272-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781634602723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1679402668</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">KF390.5.C6</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.28</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.20</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kesan, Jay P.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1132357519</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and privacy law in a nutshell</subfield><subfield code="c">Jay P. Kesan (University of Illinois at Urbana-Champaign) , Carol M. Hayes (University of Illinois at Urbana-Champaign)</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Cybersecurity and privacy law</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">St. Paul, MN</subfield><subfield code="b">West Academic Publishing</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 302 Seiten</subfield><subfield code="c">19 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Nutshell series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cybersecurity technology and actors -- Responding to cyber threats -- Computer Fraud and Abuse Act -- State cybercrime laws -- Data breaches -- Identity theft : federal -- State identity theft laws -- Recent changes to federal cybersecurity law -- Cybersecurity and international law -- Privacy theory and investigations -- Privacy law and data protection</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"[This book provides an] overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age."--</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Law and legislation / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Privacy, Right of / United States</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hayes, Carol M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">V:DE-576;B:DE-Frei85</subfield><subfield code="q">application/pdf</subfield><subfield code="u">https://swbplus.bsz-bw.de/bsz1679402668inh.htm</subfield><subfield code="v">20210414193225</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">B:DE-89</subfield><subfield code="m">V:DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">https://www.gbv.de/dms/tib-ub-hannover/1679402668.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033583929</subfield></datafield></record></collection> |
id | DE-604.BV048202971 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:47:10Z |
indexdate | 2024-07-10T09:31:53Z |
institution | BVB |
isbn | 9781634602723 1634602722 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033583929 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | XIV, 302 Seiten 19 cm |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | West Academic Publishing |
record_format | marc |
series2 | Nutshell series |
spelling | Kesan, Jay P. Verfasser (DE-588)1132357519 aut Cybersecurity and privacy law in a nutshell Jay P. Kesan (University of Illinois at Urbana-Champaign) , Carol M. Hayes (University of Illinois at Urbana-Champaign) Cybersecurity and privacy law St. Paul, MN West Academic Publishing [2019] © 2019 XIV, 302 Seiten 19 cm txt rdacontent n rdamedia nc rdacarrier Nutshell series Includes bibliographical references and index Cybersecurity technology and actors -- Responding to cyber threats -- Computer Fraud and Abuse Act -- State cybercrime laws -- Data breaches -- Identity theft : federal -- State identity theft laws -- Recent changes to federal cybersecurity law -- Cybersecurity and international law -- Privacy theory and investigations -- Privacy law and data protection "[This book provides an] overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age."-- Computer security / Law and legislation / United States Privacy, Right of / United States Hayes, Carol M. Verfasser aut V:DE-576;B:DE-Frei85 application/pdf https://swbplus.bsz-bw.de/bsz1679402668inh.htm 20210414193225 Inhaltsverzeichnis B:DE-89 V:DE-601 pdf/application https://www.gbv.de/dms/tib-ub-hannover/1679402668.pdf Inhaltsverzeichnis |
spellingShingle | Kesan, Jay P. Hayes, Carol M. Cybersecurity and privacy law in a nutshell |
title | Cybersecurity and privacy law in a nutshell |
title_alt | Cybersecurity and privacy law |
title_auth | Cybersecurity and privacy law in a nutshell |
title_exact_search | Cybersecurity and privacy law in a nutshell |
title_exact_search_txtP | Cybersecurity and privacy law in a nutshell |
title_full | Cybersecurity and privacy law in a nutshell Jay P. Kesan (University of Illinois at Urbana-Champaign) , Carol M. Hayes (University of Illinois at Urbana-Champaign) |
title_fullStr | Cybersecurity and privacy law in a nutshell Jay P. Kesan (University of Illinois at Urbana-Champaign) , Carol M. Hayes (University of Illinois at Urbana-Champaign) |
title_full_unstemmed | Cybersecurity and privacy law in a nutshell Jay P. Kesan (University of Illinois at Urbana-Champaign) , Carol M. Hayes (University of Illinois at Urbana-Champaign) |
title_short | Cybersecurity and privacy law in a nutshell |
title_sort | cybersecurity and privacy law in a nutshell |
url | https://swbplus.bsz-bw.de/bsz1679402668inh.htm https://www.gbv.de/dms/tib-ub-hannover/1679402668.pdf |
work_keys_str_mv | AT kesanjayp cybersecurityandprivacylawinanutshell AT hayescarolm cybersecurityandprivacylawinanutshell AT kesanjayp cybersecurityandprivacylaw AT hayescarolm cybersecurityandprivacylaw |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis