Personnaliser

OK

Cybersecurity Law - Jeff Kosseff

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

148,10 €

Produit Neuf

  • Ou 37,03 € /mois

    • Livraison à 0,01 €
    • Livré entre le 15 et le 27 mai
    Voir les modes de livraison

    rarewaves-uk

    PRO Vendeur favori

    4,8/5 sur + de 1 000 ventes

    Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Cybersecurity Law de Jeff Kosseff Format Relié  - Livre Informatique

        Note : 0 0 avis sur Cybersecurity Law de Jeff Kosseff Format Relié  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Cybersecurity Law de Jeff Kosseff Format Relié

         - Livre Informatique

        Livre Informatique - Jeff Kosseff - 01/09/2025 - Relié - Langue : Anglais

        . .

      • Auteur(s) : Jeff Kosseff
      • Editeur : Wiley
      • Langue : Anglais
      • Parution : 01/09/2025
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 928.0
      • ISBN : 9781394265893



      • Résumé :

        Comprehensive textbook covering the latest developments in the field of cybersecurity law

        Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this constantly evolving subject since the previous edition was released in 2022. This comprehensive text deals with all aspects of cybersecurity law, including data security and enforcement actions, anti-hacking laws, surveillance and privacy laws, and national and international cybersecurity law.

        In this new edition, readers will find insights on revisions to regulations and guidance concerning cybersecurity from federal agencies, such as 2023 SEC cybersecurity regulations for all publicly traded companies, and the Cyber Incident Reporting for Critical Infrastructure Act and its impact on the obligations of companies across the United States. Other recent developments discussed in this book include litigation from customers against companies after data breaches and the resulting legal articulation of companies' duties to secure personal information, the increased focus from lawmakers and regulators on the Internet of Things (IoT), and the FDA's guidelines for medical device cyber security.

        Readers of Cybersecurity Law will also find new information on:

        • Litigation cases where courts ruled on whether plaintiffs stated viable causes of action in data breach cases, including the Eleventh Circuit's opinion in Ramirez v. Paradies Shops
        • Fourth Amendment opinions involving geofence warrants and keyword search warrants
        • Courts' applications of the Supreme Court's first Computer Fraud and Abuse Act opinion, Van Buren v. United States
        • NIST's 2024 revisions to its popular Cybersecurity Framework
        • Version 2 of the Cybersecurity Maturity Model Certification

        Cybersecurity Law is an ideal textbook for undergraduate and graduate level courses in cybersecurity, cyber operations, management-oriented information technology (IT), and computer science. It is also a useful reference for IT professionals, government personnel, business managers, auditors, cybersecurity insurance agents, and academics in these fields....

        Biographie:

        Jeff Kosseff, JD, MPP, is a cybersecurity and privacy lawyer. He frequently speaks and writes about cybersecurity and was a journalist covering technology and politics at The Oregonian, a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting....

        Sommaire:

        About the Author xvii

        Foreword to the Fourth Edition (2026) xix

        Foreword to the Third Edition (2023) xxi

        Foreword to the Second Edition (2019) xxiii

        Acknowledgment and Disclaimers xxvii

        Introduction to First Edition xxix

        1 Data Security Laws and Enforcement Actions 1

        1.1 FTC Data Security 2

        1.1.1 Overview of Section 5 of the FTC Act 2

        1.1.2 Wyndham: Does the FTC Have Authority to Regulate Data Security Under Section 5 of the FTC Act? 6

        1.1.3 LabMD: What Constitutes Unfair Data Security? 10

        1.1.4 FTC June 2015 Guidance on Data Security, and 2017 Updates 13

        1.1.5 FTC Data Security Expectations and the NIST Cybersecurity Framework 18

        1.1.6 Lessons from FTC Cybersecurity Complaints 18

        1.1.6.1 Failure to Secure Highly Sensitive Information 19

        1.1.6.1.1 Use Industry- standard Encryption for Sensitive Data 20

        1.1.6.1.2 Routine Audits and Penetration Testing Are Expected 20

        1.1.6.1.3 Health- Related Data Requires Especially Strong Safeguards 21

        1.1.6.1.4 Data Security Protection Extends to Paper Documents 23

        1.1.6.1.5 Business- to- Business Providers Also Are Accountable to the FTC for Security of Sensitive Data 25

        1.1.6.1.6 Companies Are Responsible for the Data Security Practices of Their Contractors 27

        1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 28

        1.1.6.1.8 Privacy Matters, Even in Data Security 28

        1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 29

        1.1.6.1.10 Children's Data Requires Special Protection 29

        1.1.6.1.11 Promptly Notify Customers of Breaches of Sensitive Data 30

        1.1.6.2 Failure to Secure Payment Card Information 31

        1.1.6.2.1 Adhere to Security Claims about Payment Card Data 31

        1.1.6.2.2 Always Encrypt Payment Card Data 32

        1.1.6.2.3 Payment Card Data Should Be Encrypted Both in Storage and at Rest 32

        1.1.6.2.4 In- store Purchases Pose Significant Cybersecurity Risks 33

        1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 35

        1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 35

        1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 36

        1.1.6.3 Failure to Adhere to Security Claims 36

        1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 37

        1.1.6.3.2 Ensure That Security Controls Are Sufficient to Abide by Promises About Security and Privacy 38

        1.1.6.3.3 Omissions about Key Security Flaws Also Can Be Misleading 40

        1.1.6.3.4 Companies Must Abide by Promises for Security- related Consent Choices 41

        1.1.6.3.5 Companies That Promise Security Must Ensure Adequate Authentication Procedures 42

        1.1.6.3.6 Adhere to Promises About Encryption 43

        1.1.6.3.7 Promises About Security Extend to Vendors' Practices 44

        1.1.6.3.8 Companies Cannot Hide Vulnerable Software in Products 44

        1.1.7 FTC and Software Patching 44

        1.2 State Data Breach Notification Laws 45

        1.2.1 When Consumer Notifications Are Required 46

        1.2.1.1 Definition of Personal Information 47

        1.2.1.2 Encrypted Data 48

        1.2.1.3 Risk of Harm 48

        1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 49

        1.2.2 Notice to Individuals 49

        1.2.2.1 Timing of Notice 49

        1.2.2.2 Form of Notice 50

        1.2.2.3 Content of Notice 50

        1.2.3 Notice to Regulators and Consumer Reporting Agencies 51

        1.2.4 Penalties for Violating State Breach Notification Laws 51

        1.3 State Data Security Laws 51

        1.3.1 Oregon 53

        1.3.2 Rhode Island 54

        1.3.3 Nevada 55

        ...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com