With detailed attention to relevant supranational, regional, and national privacy and data protection laws and frameworks, the author describes and analyzes the legal strategies and responsibilities attached to the following and more:
- prompt, secure ways to identify threats, manage vulnerabilities, and respond to "incidents" and data breaches;
- most common types of cyberattacks used today;
- transparency and consent;
- rights of revocation, erasure, and correction;
- de-identification and anonymization procedures;
- data localization;
- cross-jurisdictional data transfer;
- contract negotiation;
- encryption, de-identification, anonymization, and pseudonymization; and
- Artificial Intelligence as an emerging technology that will require more dynamic and challenging conversations.
Balancing legal knowledge with technical awareness and business acumen, this book is an indispensable resource for attorneys who must provide advice on strategic implementations of new technologies, advise on the impact of certain laws on the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities. It will also be of value to other practitioners, such as security personnel and compliance professionals, who will benefit from a broad perspective exploring privacy and data protection laws and their connection with security technologies and broader organizational compliance objectives.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.