Cybersecurity law:
Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security E...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2020
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | FHN01 https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5928380 |
Zusammenfassung: | Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- About the Companion Website -- Chapter 1 Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.1.1 Overview of Section 5 of the FTC Act -- 1.1.2 Wyndham: Does the FTC Have Authority to Regulate Data Security under Section 5 of the FTC Act? -- 1.1.3 LabMD: What Constitutes "Unfair" Data Security? -- 1.1.4 FTC June 2015 Guidance on Data Security, and 2017 Updates -- 1.1.5 FTC Data Security Expectations and the NIST Cybersecurity Framework -- 1.1.6 Lessons from FTC Cybersecurity Complaints -- 1.1.6.1 Failure to Secure Highly Sensitive Information -- 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data -- 1.1.6.1.2 Routine Audits and Penetration Testing Are Expected -- 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards -- 1.1.6.1.4 Data Security Protection Extends to Paper Documents -- 1.1.6.1.5 Business-to-Business Providers Also Are Accountable to the FTC for Security of Sensitive Data -- 1.1.6.1.6 Companies Are Responsible for the Data Security Practices of Their Contractors -- 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data -- 1.1.6.1.8 Privacy Matters, Even in Data Security -- 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties -- 1.1.6.1.10 Children's Data Requires Special Protection -- 1.1.6.2 Failure to Secure Payment Card Information |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (xxxi, 725 Seiten) |
ISBN: | 9781119517290 |
Internformat
MARC
LEADER | 00000nmm a22000001c 4500 | ||
---|---|---|---|
001 | BV046271003 | ||
003 | DE-604 | ||
005 | 20201026 | ||
007 | cr|uuu---uuuuu | ||
008 | 191126s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781119517290 |9 978-1-119-51729-0 | ||
035 | |a (OCoLC)1130252176 | ||
035 | |a (DE-599)KEP047184590 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-92 | ||
082 | 0 | |a 343.730999 | |
084 | |a PZ 3250 |0 (DE-625)141166: |2 rvk | ||
100 | 1 | |a Kosseff, Jeff |d 1978- |e Verfasser |0 (DE-588)1171568215 |4 aut | |
245 | 1 | 0 | |a Cybersecurity law |c Jeff Kosseff |
250 | |a Second edition | ||
264 | 1 | |a Hoboken, NJ |b Wiley |c 2020 | |
300 | |a 1 Online-Ressource (xxxi, 725 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | 3 | |a Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- About the Companion Website -- Chapter 1 Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.1.1 Overview of Section 5 of the FTC Act -- 1.1.2 Wyndham: Does the FTC Have Authority to Regulate Data Security under Section 5 of the FTC Act? -- 1.1.3 LabMD: What Constitutes "Unfair" Data Security? -- 1.1.4 FTC June 2015 Guidance on Data Security, and 2017 Updates -- 1.1.5 FTC Data Security Expectations and the NIST Cybersecurity Framework -- 1.1.6 Lessons from FTC Cybersecurity Complaints -- 1.1.6.1 Failure to Secure Highly Sensitive Information -- 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data -- 1.1.6.1.2 Routine Audits and Penetration Testing Are Expected -- 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards -- 1.1.6.1.4 Data Security Protection Extends to Paper Documents -- 1.1.6.1.5 Business-to-Business Providers Also Are Accountable to the FTC for Security of Sensitive Data -- 1.1.6.1.6 Companies Are Responsible for the Data Security Practices of Their Contractors -- 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data -- 1.1.6.1.8 Privacy Matters, Even in Data Security -- 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties -- 1.1.6.1.10 Children's Data Requires Special Protection -- 1.1.6.2 Failure to Secure Payment Card Information | |
650 | 0 | 7 | |a Recht |0 (DE-588)4048737-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Electronic books | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Recht |0 (DE-588)4048737-4 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-119-51720-7 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, EPUB |z 978-1-119-51732-0 |
856 | 4 | 0 | |m X:EBC |u https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5928380 |x Aggregator |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031648814 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/thnuernberg/detail.action?docID=5928380 |l FHN01 |p ZDB-30-PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180714411786240 |
---|---|
any_adam_object | |
author | Kosseff, Jeff 1978- |
author_GND | (DE-588)1171568215 |
author_facet | Kosseff, Jeff 1978- |
author_role | aut |
author_sort | Kosseff, Jeff 1978- |
author_variant | j k jk |
building | Verbundindex |
bvnumber | BV046271003 |
classification_rvk | PZ 3250 |
collection | ZDB-30-PQE |
ctrlnum | (OCoLC)1130252176 (DE-599)KEP047184590 |
dewey-full | 343.730999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.730999 |
dewey-search | 343.730999 |
dewey-sort | 3343.730999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03476nmm a22004451c 4500</leader><controlfield tag="001">BV046271003</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201026 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">191126s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119517290</subfield><subfield code="9">978-1-119-51729-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1130252176</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047184590</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">343.730999</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 3250</subfield><subfield code="0">(DE-625)141166:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kosseff, Jeff</subfield><subfield code="d">1978-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1171568215</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity law</subfield><subfield code="c">Jeff Kosseff</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxi, 725 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- About the Companion Website -- Chapter 1 Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.1.1 Overview of Section 5 of the FTC Act -- 1.1.2 Wyndham: Does the FTC Have Authority to Regulate Data Security under Section 5 of the FTC Act? -- 1.1.3 LabMD: What Constitutes "Unfair" Data Security? -- 1.1.4 FTC June 2015 Guidance on Data Security, and 2017 Updates -- 1.1.5 FTC Data Security Expectations and the NIST Cybersecurity Framework -- 1.1.6 Lessons from FTC Cybersecurity Complaints -- 1.1.6.1 Failure to Secure Highly Sensitive Information -- 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data -- 1.1.6.1.2 Routine Audits and Penetration Testing Are Expected -- 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards -- 1.1.6.1.4 Data Security Protection Extends to Paper Documents -- 1.1.6.1.5 Business-to-Business Providers Also Are Accountable to the FTC for Security of Sensitive Data -- 1.1.6.1.6 Companies Are Responsible for the Data Security Practices of Their Contractors -- 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data -- 1.1.6.1.8 Privacy Matters, Even in Data Security -- 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties -- 1.1.6.1.10 Children's Data Requires Special Protection -- 1.1.6.2 Failure to Secure Payment Card Information</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Recht</subfield><subfield code="0">(DE-588)4048737-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-51720-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, EPUB</subfield><subfield code="z">978-1-119-51732-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="m">X:EBC</subfield><subfield code="u">https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5928380</subfield><subfield code="x">Aggregator</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031648814</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/thnuernberg/detail.action?docID=5928380</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046271003 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:40:09Z |
institution | BVB |
isbn | 9781119517290 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031648814 |
oclc_num | 1130252176 |
open_access_boolean | |
owner | DE-92 |
owner_facet | DE-92 |
physical | 1 Online-Ressource (xxxi, 725 Seiten) |
psigel | ZDB-30-PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Wiley |
record_format | marc |
spelling | Kosseff, Jeff 1978- Verfasser (DE-588)1171568215 aut Cybersecurity law Jeff Kosseff Second edition Hoboken, NJ Wiley 2020 1 Online-Ressource (xxxi, 725 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- About the Companion Website -- Chapter 1 Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.1.1 Overview of Section 5 of the FTC Act -- 1.1.2 Wyndham: Does the FTC Have Authority to Regulate Data Security under Section 5 of the FTC Act? -- 1.1.3 LabMD: What Constitutes "Unfair" Data Security? -- 1.1.4 FTC June 2015 Guidance on Data Security, and 2017 Updates -- 1.1.5 FTC Data Security Expectations and the NIST Cybersecurity Framework -- 1.1.6 Lessons from FTC Cybersecurity Complaints -- 1.1.6.1 Failure to Secure Highly Sensitive Information -- 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data -- 1.1.6.1.2 Routine Audits and Penetration Testing Are Expected -- 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards -- 1.1.6.1.4 Data Security Protection Extends to Paper Documents -- 1.1.6.1.5 Business-to-Business Providers Also Are Accountable to the FTC for Security of Sensitive Data -- 1.1.6.1.6 Companies Are Responsible for the Data Security Practices of Their Contractors -- 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data -- 1.1.6.1.8 Privacy Matters, Even in Data Security -- 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties -- 1.1.6.1.10 Children's Data Requires Special Protection -- 1.1.6.2 Failure to Secure Payment Card Information Recht (DE-588)4048737-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Electronic books Computersicherheit (DE-588)4274324-2 s Recht (DE-588)4048737-4 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-119-51720-7 Erscheint auch als Online-Ausgabe, EPUB 978-1-119-51732-0 X:EBC https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5928380 Aggregator |
spellingShingle | Kosseff, Jeff 1978- Cybersecurity law Recht (DE-588)4048737-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4048737-4 (DE-588)4274324-2 |
title | Cybersecurity law |
title_auth | Cybersecurity law |
title_exact_search | Cybersecurity law |
title_full | Cybersecurity law Jeff Kosseff |
title_fullStr | Cybersecurity law Jeff Kosseff |
title_full_unstemmed | Cybersecurity law Jeff Kosseff |
title_short | Cybersecurity law |
title_sort | cybersecurity law |
topic | Recht (DE-588)4048737-4 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Recht Computersicherheit |
url | https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5928380 |
work_keys_str_mv | AT kosseffjeff cybersecuritylaw |