Verkauf durch Sack Fachmedien

MBE

Cyber Security: Law and Guidance

Medium: Buch
ISBN: 978-1-5265-2810-0
Verlag: Bloomsbury Publishing PLC
Erscheinungstermin: 23.01.2025
Lieferfrist: bis zu 10 Tage

With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.

Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states.

Revised and updated, the Second Edition also benefits readers with coverage of new topics including:

- The legal risks of generative AI
- Cyber security disputes
- Data architecture
- Social media and cyber security

- Non-fungible tokens ('NFTs') as legal property
- Cyber security checklist and triage

In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security.

This title is included in Bloomsbury Professional's Cyber Law online service.


Produkteigenschaften


  • Artikelnummer: 9781526528100
  • Medium: Buch
  • ISBN: 978-1-5265-2810-0
  • Verlag: Bloomsbury Publishing PLC
  • Erscheinungstermin: 23.01.2025
  • Sprache(n): Englisch
  • Auflage: 2. Auflage 2025
  • Produktform: Gebunden, Hardback
  • Gewicht: 1376 g
  • Seiten: 896
  • Format (B x H x T): 163 x 254 x 50 mm
  • Ausgabetyp: Kein, Unbekannt
Autoren/Hrsg.

Autoren

Helen Wong MBE is a senior consultant and advises on a broad range of corporate transactional work including public and private acquisitions and disposals, investments and joint ventures. She acts for a number of business owners, high net worth individuals, family businesses and entrepreneurs. She has substantial regulatory expertise relevant to the financial services and wealth management sector, dental, healthcare and educational transactions. Helen acts on cross border in-bound investment transactions from Hong Kong and China into the UK.Helen is also a mentor to a number of junior lawyers and is an author of a number of books including Cyber Security Law and Guidance.

1. Threats

2. Vulnerabilities

3. The Law
4. Defend
4A. The Risk Practitioner's Journey: Risk Aligned Assurance and the Three Lines of Defense

4B. NCSC Research Problem Book - How to Defend
5. Privacy and Security in the Workplace

6. Cyber Security and Physical Buildings
7. Cyber Breach Playbook and Flow Chart
8. The C Suite Perspective on Cyber Risk

9. Cyber Security Checklist and Triage
9A. Checklist for Addressing and Preparing for Cybersecurity Incidents

9B. Cyber Incident Checklist
9C. Security Incident Notification Requirements (UK)

10. Industry Specialists In-Depth Reports
10A. Mobile Payments
10B. Electric Utilities: Critical Infrastructure Protection and Reliability Standards

10C. Securing Critical Manufacturing Sectors from Modern Cyber Threats

10D. UK Financial Services
10E. Cybersecurity for the Energy Sector: Toward Energy 4.0

10F. Aerospace, Defence and Security Sector

10G. Banking in the Emirates - The NBD Way
10H. Healthcare
10I. Medical Devices
11. Social Media and Cyber Security

12. International Law and Interaction between States

13. Security Concerns with The Internet of Things
14. Managing Cyber-Security in an International Financial Institution

15. Employee Liability and Protection

16. Data Security - The New Oil

17. Data Classification

18. Liability Following a Data Breach
19. Criminal Law

20. The Digital Next Way
21A. Product Security and Telecommunications Infrastructure Act 2022
21B. Intelligence and the Monitoring of Everyday Life
22. Cyber Security Law and Legislation: Protecting Data in the UK, EU, and USA: Breachless Liability

23. Data Architecture: Cybersecurity's Silent Partner

24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues

25. Protecting Organisations

26. Public Private Partnerships

27. Cyber Security Disputes
28. The Jello Problem: Key Features of Generative AI That Create Legal Risk

29. Cyber Secret, Life Secrets - On the Verge of Human Science
30. A Plan for the SME
31. Conclusion

Appendices