|
![]() |
|||
|
||||
OverviewWith cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework. Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states. Revised and updated, the Second Edition also benefits readers with coverage of new topics including: - The legal risks of generative AI - Cyber security disputes - Data architecture - Social media and cyber security - Non-fungible tokens (‘NFTs’) as legal property - Cyber security checklist and triage In addition to contributions from leading international experts, the book also features in-depth reports from industry specialists. Additional context is provided through insights into how the law is developed outside the regulatory frameworks, case law and the role of professional and industry standards for security. This title is included in Bloomsbury Professional's Cyber Law online service. Full Product DetailsAuthor: Helen Wong MBE (Senior Consultant, Setfords, UK)Publisher: Bloomsbury Publishing PLC Imprint: Bloomsbury Professional Edition: 2nd edition Weight: 0.600kg ISBN: 9781526528100ISBN 10: 152652810 Pages: 696 Publication Date: 28 November 2024 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Forthcoming Availability: To order ![]() Table of Contents1. Threats 2. Vulnerabilities 3. The Law 4. How to Defend 5. Privacy and Security in the Workplace 6. Security in the Built Environment 7. The Importance of Policy and Guidance in Digital Communications 8. The C Suite Perspective on Cyber Risk 9. Corporate Governance Mind Map 10. Industry Specialists In-Depth Reports 11. Social Media and Cyber Security 12. International Law and Interaction between States 13. Security Concerns with The Internet of Things 14. Managing Cyber-Security in an International Financial Institution 15. Employee Liability and Protection 16. Data Security – The New Oil 17. Data Classification 18. Liability Following a Data Breach 19. Criminal Law 20. The Digital Next Way 21. Intelligence and the Monitoring of Everyday Lige 22. Collaboration: Results? 23. Cybersecurity: The Cause and the Cure 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues 25. Protecting Organisations 26. Public Private Partnerships 27. Behavioural Science in Cyber Security 28. Agile Cyber Security Process Capability 29. Cyber Secret, Life Secrets – On the Verge of Human Science 30. A Plan for the SME 31. ConclusionReviewsThis considerable tome will be as useful for legal practitioners as it will for DPOs and cyber security practitioners as they seek to understand the latest developments in cyber security and data protection in the European Union and the United Kingdom -- Continuity Risk and Insurance Magazine (review of previous edition) This considerable tome will be as useful for legal practitioners as it will for DPOs and cyber security practitioners as they seek to understand the latest developments in cyber security and data protection in the European Union and the United Kingdom. -- Continuity Risk and Insurance Magazine (review of previous edition) Author InformationHelen Wong MBE is a senior consultant and advises on a broad range of corporate transactional work including public and private acquisitions and disposals, investments and joint ventures. She acts for a number of business owners, high net worth individuals, family businesses and entrepreneurs. Tab Content 6Author Website:Countries AvailableAll regions |