Cybersecurity law:

Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security E...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Kosseff, Jeff 1978- (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hoboken, NJ Wiley 2020
Ausgabe:Second edition
Schlagworte:
Online-Zugang:FHN01
https://ebookcentral.proquest.com/lib/gbv/detail.action?docID=5928380
Zusammenfassung:Cover -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgment and Disclaimers -- Foreword to the Second Edition (2019) -- Introduction to First Edition -- Private Sector Data Security Laws (Chapters 1-4) -- Anti‐Hacking Laws (Chapter 5) -- Public-Private Security Efforts (Chapter 6) -- Government Surveillance Laws (Chapter 7) -- Cybersecurity Requirements for Government Contractors (Chapter 8) -- Privacy Law (Chapter 9) -- About the Companion Website -- Chapter 1 Data Security Laws and Enforcement Actions -- 1.1 FTC Data Security -- 1.1.1 Overview of Section 5 of the FTC Act -- 1.1.2 Wyndham: Does the FTC Have Authority to Regulate Data Security under Section 5 of the FTC Act? -- 1.1.3 LabMD: What Constitutes "Unfair" Data Security? -- 1.1.4 FTC June 2015 Guidance on Data Security, and 2017 Updates -- 1.1.5 FTC Data Security Expectations and the NIST Cybersecurity Framework -- 1.1.6 Lessons from FTC Cybersecurity Complaints -- 1.1.6.1 Failure to Secure Highly Sensitive Information -- 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data -- 1.1.6.1.2 Routine Audits and Penetration Testing Are Expected -- 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards -- 1.1.6.1.4 Data Security Protection Extends to Paper Documents -- 1.1.6.1.5 Business-to-Business Providers Also Are Accountable to the FTC for Security of Sensitive Data -- 1.1.6.1.6 Companies Are Responsible for the Data Security Practices of Their Contractors -- 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data -- 1.1.6.1.8 Privacy Matters, Even in Data Security -- 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties -- 1.1.6.1.10 Children's Data Requires Special Protection -- 1.1.6.2 Failure to Secure Payment Card Information
Beschreibung:Description based on publisher supplied metadata and other sources
Beschreibung:1 Online-Ressource (xxxi, 725 Seiten)
ISBN:9781119517290

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand!