Book description
This book gives insight into the legal aspects of data ownership in the 21st century.With the amount of information being produced and collected growing at an ever accelerating rate, governments are implementing laws to regulate the use of this information by corporations. Companies are more likely than ever to face heavy lawsuits and sanctions for any misuse of information, which includes data breaches caused by cybercriminals.
This book serves as a guide to all companies that collect customer information, by giving instructions on how to avoid making these costly mistakes and to ensure they are not liable in the event of stolen information.
Table of contents
- Chapter 1 Introduction to Information Security Law: This Will Explain the Current Laws Around Information Security that Businesses Need to Be Aware of
- Chapter 2 Cyber Law and Intellectual Property: This Chapter Will Address an Important Aspect of Cyber Law Related to Protecting a Companies IP
- Chapter 3 What Are the Corporate Requirements for Cybersecurity?: This Goes into Detail About What Actions Companies Need to Take to Ensure that They Are in Full Compliance with Information Security Legislation
- Chapter 4 What Are the Financial and Reputational Implications of Information Security Legislation: What Types of Lawsuits Can Be Brought Against a Company that Doesn’t Comply with the Current Information Security Laws and How Costly Are They?
- Chapter 5 Required Encryption Standards: This Chapter Will Discuss the Importance of Using a Certain Level of Encryption for any Information that You’re Company Holds While It Is in Your Possession and When It Is in Transit (on Your Website, Sent to Third Party Partners, and so on) and How You Can Find Software that Will Do This for You
- Chapter 6 How to Offload Legal Liability onto Third Parties: This Chapter Will Discuss Third Party Solutions that You Can Use to Secure Your Data and Will Accept Liability if any Data Breaches Do Occur
- Chapter 7 The Importance of Cybersecurity Specific Insurance: A Common Mistake Companies Make Is Assuming Their General Insurance Plan Will Cover Cybersecurity Incidents, Which It Often Won’t. It’s Important that Companies Have a Cybersecurity Specific Insurance Plan. This Chapter Will Discuss This and Give Some Options
- Chapter 8 What Type of People and Policies Should You Have to Ensure You Are Complying with Regulations: This Chapter Will Talk About the Type of Experience You Want to Look for When Hiring an Employee into Your Cybersecurity Department to Ensure that They Will Be Mindful of the Legal Implications Your Company Will Be Facing
- Chapter 9 Interacting with Law Enforcement: What Rights Do Government Officials Have When It Comes to Accessing a Companies Data on Clients/Customers? When Do You Have the Right to Say No to an Investigator?
- Chapter 10 Recap and Conclusion: This Chapter Will Recap the Most Important Elements of the Previous Chapters and Highlight Key Takeaways for the Readers
- About the Author
- Index
Product information
- Title: Cybersecurity Law
- Author(s):
- Release date: February 2019
- Publisher(s): Business Expert Press
- ISBN: 9781948976732
You might also like
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …
video
Complete Python Course with 10 Real-World Projects
Python is a multi-paradigm programming language with object-oriented and structured programming fully supported, and many features …
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …