With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework. Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between…mehr
With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework. Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states. Revised and updated, the Second Edition also benefits readers with coverage of new topics including: - The legal risks of generative AI - Cyber security disputes - Data architecture - Social media and cyber security - Non-fungible tokens ('NFTs') as legal property - Cyber security checklist and triage In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security. This title is included in Bloomsbury Professional's Cyber Law online service.
Helen Wong MBE is a senior consultant and advises on a broad range of corporate transactional work including public and private acquisitions and disposals, investments and joint ventures. She acts for a number of business owners, high net worth individuals, family businesses and entrepreneurs.
Inhaltsangabe
1. Threats 2. Vulnerabilities 3. The Law 4. Defend 4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense 4B. NCSC Research Problem Book - How to Defend 5. Privacy and Security in the Workplace 6. Cyber Security and Physical Buildings 7. Cyber Breach Playbook and Flow Chart 8. The C Suite Perspective on Cyber Risk 9. Cyber Security Checklist and Triage 9A. Checklist for Addressing and Preparing for Cybersecurity Incidents 9B. Cyber Incident Checklist 9C. Security Incident Notification Requirements (UK) 10. Industry Specialists In-Depth Reports 10A. Mobile Payments 10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards 10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats 10D. UK Financial Services 10E. Cybersecurity for the Energy Sector: Toward Energy 4.0 10F. Aerospace, Defence and Security Sector 10G. Banking in the Emirates - The NBD Way 10H. Healthcare 10I. Medical Devices 11. Social Media and Cyber Security 12. International Law and Interaction between States 13. Security Concerns with The Internet of Things 14. Managing Cyber-Security in an International Financial Institution 15. Employee Liability and Protection 16. Data Security - The New Oil 17. Data Classification 18. Liability Following a Data Breach 19. Criminal Law 20. The Digital Next Way 21A. Product Security and Telecommunications Infrastructure Act 2022 21B. Intelligence and the Monitoring of Everyday Life 22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability 23. Data Architecture: Cybersecurity's Silent Partner 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues 25. Protecting Organisations 26. Public Private Partnerships 27. Cyber Security Disputes 28. The Jello Problem: Key Features of Generative AI That Create Legal Risk 29. Cyber Secret, Life Secrets - On the Verge of Human Science 30. A Plan for the SME 31. Conclusion Appendices
1. Threats 2. Vulnerabilities 3. The Law 4. Defend 4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense 4B. NCSC Research Problem Book - How to Defend 5. Privacy and Security in the Workplace 6. Cyber Security and Physical Buildings 7. Cyber Breach Playbook and Flow Chart 8. The C Suite Perspective on Cyber Risk 9. Cyber Security Checklist and Triage 9A. Checklist for Addressing and Preparing for Cybersecurity Incidents 9B. Cyber Incident Checklist 9C. Security Incident Notification Requirements (UK) 10. Industry Specialists In-Depth Reports 10A. Mobile Payments 10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards 10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats 10D. UK Financial Services 10E. Cybersecurity for the Energy Sector: Toward Energy 4.0 10F. Aerospace, Defence and Security Sector 10G. Banking in the Emirates - The NBD Way 10H. Healthcare 10I. Medical Devices 11. Social Media and Cyber Security 12. International Law and Interaction between States 13. Security Concerns with The Internet of Things 14. Managing Cyber-Security in an International Financial Institution 15. Employee Liability and Protection 16. Data Security - The New Oil 17. Data Classification 18. Liability Following a Data Breach 19. Criminal Law 20. The Digital Next Way 21A. Product Security and Telecommunications Infrastructure Act 2022 21B. Intelligence and the Monitoring of Everyday Life 22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability 23. Data Architecture: Cybersecurity's Silent Partner 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues 25. Protecting Organisations 26. Public Private Partnerships 27. Cyber Security Disputes 28. The Jello Problem: Key Features of Generative AI That Create Legal Risk 29. Cyber Secret, Life Secrets - On the Verge of Human Science 30. A Plan for the SME 31. Conclusion Appendices
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826