Book description
The second edition of the definitive guide to cybersecurity law, updated to reflect recent legal developments
The revised and updated second edition of Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity. Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information that reflects the latest changes in laws and regulations. The book includes material on recent FTC data security consent decrees and data breach litigation.
Topics covered reflect new laws, regulations, and court decisions that address financial sector cybersecurity, the law of war as applied to cyberspace, and recently updated guidance for public companies’ disclosure of cybersecurity risks. This important guide:
- Provides a new appendix, with 15 edited opinions covering a wide range of cybersecurity-related topics, for students learning via the caselaw method
- Includes new sections that cover topics such as: compelled access to encrypted devices, New York’s financial services cybersecurity regulations, South Carolina’s insurance sector cybersecurity law, the Internet of Things, bug bounty programs, the vulnerability equities process, international enforcement of computer hacking laws, the California Consumer Privacy Act, and the European Union’s Network and Information Security Directive
- Contains a new chapter on the critical topic of law of cyberwar
- Presents a comprehensive guide written by a noted expert on the topic
- Offers a companion Instructor-only website that features discussion questions for each chapter and suggested exam questions for each chapter
Written for students and professionals of cybersecurity, cyber operations, management-oriented information technology (IT), and computer science, Cybersecurity Law, Second Edition is the up-to-date guide that covers the basic principles and the most recent information on cybersecurity laws and regulations.
JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He was a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
Table of contents
- Cover
- About the Author
- Acknowledgment and Disclaimers
- Foreword to the Second Edition (2019)
- Introduction to First Edition
- About the Companion Website
- 1 Data Security Laws and Enforcement Actions
- 2 Cybersecurity Litigation
-
3 Cybersecurity Requirements for Specific Industries
- 3.1 Financial Institutions: Gramm‐Leach‐Bliley Act Safeguards Rule
- 3.2 New York Department of Financial Services Cybersecurity Regulations
- 3.3 Financial Institutions and Creditors: Red Flags Rule
- 3.4 Companies that Use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS)
- 3.5 California Internet of Things Cybersecurity Law
- 3.6 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule
- 3.7 Electric Transmission: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards
- 3.8 Nuclear Regulatory Commission Cybersecurity Regulations
- 3.9 South Carolina Insurance Cybersecurity Law
- 4 Cybersecurity and Corporate Governance
- 5 Anti‐Hacking Laws
-
6 U.S. Government Cyber Structure and Public–Private Cybersecurity Partnerships
- 6.1 U.S. Government's Civilian Cybersecurity Organization
- 6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015
- 6.3 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework
- 6.4 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act
- 6.5 Vulnerabilities Equities Process
- 7 Surveillance and Cyber
- 8 Cybersecurity and Federal Government Contractors
-
9 Privacy Laws
- 9.1 Section 5 of the FTC Act and Privacy
- 9.2 Health Insurance Portability and Accountability Act
- 9.3 Gramm‐Leach‐Bliley Act and California Financial Information Privacy Act
- 9.4 CAN‐SPAM Act
- 9.5 Video Privacy Protection Act
- 9.6 Children's Online Privacy Protection Act
- 9.7 California Online Privacy Laws
- 9.8 California Consumer Privacy Act
- 9.9 Illinois Biometric Information Privacy Act
- 10 International Cybersecurity Law
-
11 Cyber and the Law of War
- 11.1 Was the Cyberattack a “Use of Force” that Violates International Law?
- 11.2 If the Attack Was a Use of Force, Was that Force Attributable to a State?
- 11.3 Did the Use of Force Constitute an “Armed Attack” that Entitles the Target to Self‐Defense?
- 11.4 If the Use of Force Was an Armed Attack, What Types of Self‐Defense Are Justified?
- 11.5 If the Nation Experiences Hostile Cyber Actions that Fall Short of Use of Force or Armed Attacks, What Options Are Available?
- Appendix A: Text of Section 5 of the FTC Act
-
Appendix B: Summary of State Data Breach Notification Laws
- Alabama
- Alaska
- Arizona
- Arkansas
- California
- Colorado
- Connecticut
- Delaware
- District of Columbia
- Florida
- Georgia
- Hawaii
- Idaho
- Illinois
- Indiana
- Iowa
- Kansas
- Kentucky
- Louisiana
- Maine
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Mississippi
- Missouri
- Montana
- Nebraska
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- North Carolina
- North Dakota
- Ohio
- Oklahoma
- Oregon
- Pennsylvania
- Rhode Island
- South Carolina
- South Dakota
- Tennessee
- Texas
- Utah
- Vermont
- Virginia
- Washington State
- West Virginia
- Wisconsin
- Wyoming
- Appendix C: Text of Section 1201 of the Digital Millennium Copyright Act
- Appendix D: Text of the Computer Fraud and Abuse Act
- Appendix E: Text of the Electronic Communications Privacy Act
- Appendix F: Key Cybersecurity Court Opinions
- Index
- End User License Agreement
Product information
- Title: Cybersecurity Law, 2nd Edition
- Author(s):
- Release date: November 2019
- Publisher(s): Wiley
- ISBN: 9781119517207
You might also like
book
Cybersecurity Law
This book gives insight into the legal aspects of data ownership in the 21st century. With …
book
Cybersecurity and Privacy Law Handbook
Get to grips with cybersecurity and privacy laws to protect your company's data and comply with …
book
Executive Guide to Information Security, The: Threats, Challenges, and Solutions
Praise for The Executive Guide to Information Security "In today's world, no business can operate without …
book
Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s …