top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Autore Bandler John
Pubbl/distr/stampa Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Descrizione fisica 1 online resource (xxiv, 392 pages) : illustrations
Disciplina 005.8024/34
Soggetto topico Computer security - Law and legislation - United States
Computer networks - Security measures - United States
Law offices - United States
Data protection - Law and legislation - United States
ISBN 1-63425-908-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgments -- Foreword -- CHAPTER 1 The Need for Cybersecurity -- Why This Book? -- What You Should Do Right Now -- How This Book Is Organized -- You Can Improve Your Own Cybersecurity -- CHAPTER 2 The Black Market for Your Data: The Cybercrime Economy -- A. Introduction -- B. It Is a Big Business -- C. It Is International -- D. Digital Currency -- E. Payment Card Fraud: An Example of the Cybercrime Economy -- F. Other Cybercrime and Identity Theft Schemes -- 1. Financial Account Takeover -- 2. New Financial Account Opening -- 3. Infected Computers -- 4. Phishing, Spam, and Internet Account Takeover -- 5. Other Ways to Obtain Passwords -- 6. E-mail Account Compromise (Hack) -- 7. Ransomware -- 8. Scareware and Technical Support Scams -- G. Government and Law Enforcement Response -- CHAPTER 3 Advertising: Another Market for Your Data -- A. Introduction -- B. Corporate Collection and Use of Your Information and Data -- C. What (or Who) Is the Product? -- D. Privacy Policies and the Consumer -- E. Corporate Data Storage -- F. Conclusion -- CHAPTER 4 Basic Information Security Principles -- A. Introduction -- B. Physical Security -- 1. Theft and Damage -- 2. Controlling Access to Your Devices at Home -- C. Confidentiality -- 1. Authentication -- 2. Encryption -- D. Availability -- 1. "If It Ain't Broke, Don't Fix It." But Maybe It Is Broken After All? -- 2. Availability, Authentication, and Confidentiality -- 3. Availability and Ransomware and Other Malicious Destruction -- 4. Availability and Backup -- 5. Business Continuity and Disaster Recovery Planning -- E. Integrity -- F. The Principle of "Least Privilege" and "Need to Know" -- 1. Data Access -- 2. Administrator Rights and Accounts -- G. Information Classification -- H. Conclusion.
CHAPTER 5 Basic Computer Principles -- A. Introduction -- B. The Evolution of Computing -- 1. Storing Information -- 2. Processing Information -- C. Computer Hardware -- 1. Case -- 2. Power Supply -- 3. Display -- 4. Ports: USB, Parallel, Serial, VGA, DVI, HDMI, DP -- 5. Input Devices (Keyboard, Mouse, Microphone, Camera, and More) -- 6. Network Interface Controller -- 7. Processor (Central Processing Unit, Microprocessor) -- 8. Random Access Memory -- 9. Motherboard (System Board) -- 10. Internal Data Storage -- 11. External Data Storage -- 12. External Devices Such as Scanners and Printers -- D. Programs That Run on Your Computer: BIOS, Operating System, Applications -- 1. BIOS -- 2. Operating System -- 3. File System -- 4. Applications (Software) -- 5. Virtual Ports -- E. From Desktop to Miniature: Laptop, Notebook, Tablet, Smartphone, Smartwatch, IoT -- F. Computers on Steroids: The Cloud and Data Centers -- G. Encryption of Data at Rest -- H. Conclusion -- CHAPTER 6 Basic Networking and the Internet -- A. Introduction -- B. Network Interface Controller -- C. Internet -- 1. Dial-up -- 2. Cable Internet (Broadband) -- 3. Phone Company Internet (DSL, FiOS) -- 4. Cellular Company Internet -- 5. Satellite Internet -- D. Modem -- E. Router -- F. Internet Communication 101 -- 1. IP Addresses on the Internet -- 2. IP Addresses on Your Local Network: Network Address Translation -- 3. Ports: Virtual Router Ports and Computer Ports -- 4. TCP/UDP Internet Protocols (Language) -- 5. Network Layers -- G. Wired Networking -- H. Wireless Networking -- I. Encryption in Transit -- J. Conclusion -- CHAPTER 7 Start Securing Yourself -- A. Introduction -- B. Set Your Cybersecurity Dial -- C. Turning Up Your Security Dial Is an Investment -- D. There Is No Perfect Product or Solution -- E. Let's Get Started (If You Haven't Already).
1. Put a Password on All of Your Computing Devices -- 2. Enable the "Auto Lock" Feature -- 3. Run an Anti-Malware Scan on Your Laptop and Desktop -- 4. Disconnect from the Internet When You Don't Need It -- 5. Use Complex and Unique Passwords -- 6. Enable "Two-Step" Login -- 7. Ensure That Your Home Wi-Fi Network Is Password Protected -- F. Conclusion -- CHAPTER 8 Secure Your Devices -- A. Introduction -- B. Mentally Assess Your Devices -- C. Getting Started -- D. Device Inventory (Scavenger Hunt) -- 1. Device Description -- 2. Ownership and Expectation of Privacy -- E. Access: Physical Control -- F. Access: Electronic (Technical) -- 1. Device Password Complexity -- 2. Auto Lock Feature and Affirmatively Locking Your Device -- G. User Accounts: Usage by Whom and for What Purposes? -- 1. Administrator Accounts vs. User Accounts -- 2. Segregation of User Accounts -- H. Operating System -- I. Applications (Software) -- J. Data Stored on Device -- K. Data the Device Can Access (Cloud Data) -- L. Anti-Malware -- M. Internet Access -- N. Firewall -- O. Decommissioning Your Device -- 1. Basic Decommissioning Steps -- P. Conclusion -- CHAPTER 9 Secure Your Data -- A. Introduction -- B. Mentally Assess Your Data and What It Means to You -- 1. Assess Your Own Skills and Memory -- 2. Assess by Data Type -- 3. Assess by Data Importance and Risk -- 4. Assess by Data Storage Location and Provider -- 5. Assessment Wrap-Up -- C. Getting Started -- D. Secure Your Devices (Encore) -- E. Back Up Your Data -- 1. Manually Back Up Data to an External Hard Drive -- 2. Make Incremental Backups of Your Most Important Documents -- 3. Manually Back Up Data from Your Cloud Accounts to a Local Device or External Hard Drive -- 4. Backup Using Your Operating System's Native Backup Application -- 5. Automatic Backup vs. Manual Backup.
F. Secure Your Cloud Data and Internet Accounts (and Back Them Up) -- 1. Secure Your Important Online Accounts -- 2. Secure Your "Unimportant Accounts" as Best You Can -- G. Consider Encryption to Secure Data on Your Local Device -- 1. To Encrypt or Not to Encrypt? That Is the Question -- 2. Encryption by the Application -- 3. File and Folder Encryption by the Operating System -- 4. Full Disk Encryption -- 5. Encryption Summary -- H. Organize Your Data-Your Files and Folders -- 1. Basic File Organization Concepts -- 2. Storage Location -- I. Conclusion -- CHAPTER 10 Secure Your Network and Internet Use -- A. Introduction -- B. Mentally Assess Your Home Network -- C. Identify Parts of Your Home Network -- D. Internet Connection -- E. Modem -- F. Router and Wi-Fi -- 1. Learn About Basic Wi-Fi Routing -- 2. Log In to Your Router Administration Portal -- 3. Secure Your Router Administration Username and Password -- 4. Update Router Firmware -- 5. Secure the Wi-Fi Network Password and Ensure the Network Is Encrypted -- 6. Evaluate Your Wi-Fi Network Name -- 7. Disable Wi-Fi Protected Setup -- 8. Disable Remote Access Features You Don't Need -- 9. Enable Your Router's Firewall (If Available) -- 10. Disable Universal Plug and Play If You Don't Need It -- 11. Run Your Router's Security Self-Assessment Function (If Available) -- 12. Enable a Guest Network on Your Router (If Available) -- 13. Check Your Router's Physical Security -- 14. Learn About Additional Router and Wi-Fi Security Features -- 15. Wi-Fi Router Conclusion -- G. Software Firewalls (Encore for Your Laptops and Desktops) -- H. Review Device Software That Accesses the Internet (Encore for What Is Phoning Home) -- I. How Your Data Is Transmitted -- J. Equipment on the Network -- 1. Printers, Scanners, Fax Machines, All-in-Ones, and More -- 2. Network Attached Storage.
K. The "Internet of Things" and Smart Homes -- L. Reduce Your Attack Surface: Disconnect When Not Needed -- M. More About Networks for the Very Curious -- 1. Windows Task Manager -- 2. Windows Resource Monitor -- 3. Windows Firewall -- 4. Windows Firewall with Advanced Security -- 5. Windows Commands Regarding Network Activity -- 6. Mac Applications and Commands Regarding Network Activity -- 7. Install a Free Software Firewall -- N. Conclusion -- CHAPTER 11 Secure Your Family, Children, and Seniors -- A. Introduction -- B. Children -- 1. Assessment -- 2. Your Parental "Privacy Policy" -- 3. Educating Your Child to Make Good Decisions -- 4. Reviewing Your Child's Devices and Computer Usage -- 5. Sample Guidelines or Rules of Conduct -- 6. Reviewing the Data That Is Posted About Your Children -- C. Seniors -- D. Conclusion -- CHAPTER 12 Secure Yourself When You Travel -- A. Introduction -- B. Devices and Travel -- 1. Preventing Loss or Theft -- 2. Using Someone Elses Device -- C. Internet Access and Travel -- D. Data and Travel -- 1. Data You Bring (Data at Rest) -- 2. Data You Access (Data in Transit) -- E. Miscellaneous Anti-Fraud When You Travel -- F. Special Considerations When Traveling to Certain Countries -- G. Conclusion -- CHAPTER 13 Secure the Work Office -- A. Introduction -- B. The Workplace Mental Assessment -- C. Physically Secure Your Office -- 1. Visitor Entry -- 2. Locks and Doors -- 3. Alarm Systems and Video Surveillance -- 4. The "Plain View" Doctrine in Your Office -- D. Securing Your Employees and Coworkers -- 1. Screening and the Insider Threat -- 2. Training -- 3. Shadow IT in the Office -- 4. Acceptable Use of Workplace Computers -- E. Secure the Devices in Your Office -- F. Secure the Data in Your Office -- 1. Network Storage Devices in Your Office -- 2. Documents and Data in the Cloud -- 3. E-mail -- 4. Data at Rest.
5. Data in Transit.
Record Nr. UNINA-9910796734103321
Bandler John  
Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security / / John Bandler
Autore Bandler John
Pubbl/distr/stampa Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Descrizione fisica 1 online resource (xxiv, 392 pages) : illustrations
Disciplina 005.8024/34
Soggetto topico Computer security - Law and legislation - United States
Computer networks - Security measures - United States
Law offices - United States
Data protection - Law and legislation - United States
ISBN 1-63425-908-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title Page -- Copyright -- Dedication -- Contents -- About the Author -- Acknowledgments -- Foreword -- CHAPTER 1 The Need for Cybersecurity -- Why This Book? -- What You Should Do Right Now -- How This Book Is Organized -- You Can Improve Your Own Cybersecurity -- CHAPTER 2 The Black Market for Your Data: The Cybercrime Economy -- A. Introduction -- B. It Is a Big Business -- C. It Is International -- D. Digital Currency -- E. Payment Card Fraud: An Example of the Cybercrime Economy -- F. Other Cybercrime and Identity Theft Schemes -- 1. Financial Account Takeover -- 2. New Financial Account Opening -- 3. Infected Computers -- 4. Phishing, Spam, and Internet Account Takeover -- 5. Other Ways to Obtain Passwords -- 6. E-mail Account Compromise (Hack) -- 7. Ransomware -- 8. Scareware and Technical Support Scams -- G. Government and Law Enforcement Response -- CHAPTER 3 Advertising: Another Market for Your Data -- A. Introduction -- B. Corporate Collection and Use of Your Information and Data -- C. What (or Who) Is the Product? -- D. Privacy Policies and the Consumer -- E. Corporate Data Storage -- F. Conclusion -- CHAPTER 4 Basic Information Security Principles -- A. Introduction -- B. Physical Security -- 1. Theft and Damage -- 2. Controlling Access to Your Devices at Home -- C. Confidentiality -- 1. Authentication -- 2. Encryption -- D. Availability -- 1. "If It Ain't Broke, Don't Fix It." But Maybe It Is Broken After All? -- 2. Availability, Authentication, and Confidentiality -- 3. Availability and Ransomware and Other Malicious Destruction -- 4. Availability and Backup -- 5. Business Continuity and Disaster Recovery Planning -- E. Integrity -- F. The Principle of "Least Privilege" and "Need to Know" -- 1. Data Access -- 2. Administrator Rights and Accounts -- G. Information Classification -- H. Conclusion.
CHAPTER 5 Basic Computer Principles -- A. Introduction -- B. The Evolution of Computing -- 1. Storing Information -- 2. Processing Information -- C. Computer Hardware -- 1. Case -- 2. Power Supply -- 3. Display -- 4. Ports: USB, Parallel, Serial, VGA, DVI, HDMI, DP -- 5. Input Devices (Keyboard, Mouse, Microphone, Camera, and More) -- 6. Network Interface Controller -- 7. Processor (Central Processing Unit, Microprocessor) -- 8. Random Access Memory -- 9. Motherboard (System Board) -- 10. Internal Data Storage -- 11. External Data Storage -- 12. External Devices Such as Scanners and Printers -- D. Programs That Run on Your Computer: BIOS, Operating System, Applications -- 1. BIOS -- 2. Operating System -- 3. File System -- 4. Applications (Software) -- 5. Virtual Ports -- E. From Desktop to Miniature: Laptop, Notebook, Tablet, Smartphone, Smartwatch, IoT -- F. Computers on Steroids: The Cloud and Data Centers -- G. Encryption of Data at Rest -- H. Conclusion -- CHAPTER 6 Basic Networking and the Internet -- A. Introduction -- B. Network Interface Controller -- C. Internet -- 1. Dial-up -- 2. Cable Internet (Broadband) -- 3. Phone Company Internet (DSL, FiOS) -- 4. Cellular Company Internet -- 5. Satellite Internet -- D. Modem -- E. Router -- F. Internet Communication 101 -- 1. IP Addresses on the Internet -- 2. IP Addresses on Your Local Network: Network Address Translation -- 3. Ports: Virtual Router Ports and Computer Ports -- 4. TCP/UDP Internet Protocols (Language) -- 5. Network Layers -- G. Wired Networking -- H. Wireless Networking -- I. Encryption in Transit -- J. Conclusion -- CHAPTER 7 Start Securing Yourself -- A. Introduction -- B. Set Your Cybersecurity Dial -- C. Turning Up Your Security Dial Is an Investment -- D. There Is No Perfect Product or Solution -- E. Let's Get Started (If You Haven't Already).
1. Put a Password on All of Your Computing Devices -- 2. Enable the "Auto Lock" Feature -- 3. Run an Anti-Malware Scan on Your Laptop and Desktop -- 4. Disconnect from the Internet When You Don't Need It -- 5. Use Complex and Unique Passwords -- 6. Enable "Two-Step" Login -- 7. Ensure That Your Home Wi-Fi Network Is Password Protected -- F. Conclusion -- CHAPTER 8 Secure Your Devices -- A. Introduction -- B. Mentally Assess Your Devices -- C. Getting Started -- D. Device Inventory (Scavenger Hunt) -- 1. Device Description -- 2. Ownership and Expectation of Privacy -- E. Access: Physical Control -- F. Access: Electronic (Technical) -- 1. Device Password Complexity -- 2. Auto Lock Feature and Affirmatively Locking Your Device -- G. User Accounts: Usage by Whom and for What Purposes? -- 1. Administrator Accounts vs. User Accounts -- 2. Segregation of User Accounts -- H. Operating System -- I. Applications (Software) -- J. Data Stored on Device -- K. Data the Device Can Access (Cloud Data) -- L. Anti-Malware -- M. Internet Access -- N. Firewall -- O. Decommissioning Your Device -- 1. Basic Decommissioning Steps -- P. Conclusion -- CHAPTER 9 Secure Your Data -- A. Introduction -- B. Mentally Assess Your Data and What It Means to You -- 1. Assess Your Own Skills and Memory -- 2. Assess by Data Type -- 3. Assess by Data Importance and Risk -- 4. Assess by Data Storage Location and Provider -- 5. Assessment Wrap-Up -- C. Getting Started -- D. Secure Your Devices (Encore) -- E. Back Up Your Data -- 1. Manually Back Up Data to an External Hard Drive -- 2. Make Incremental Backups of Your Most Important Documents -- 3. Manually Back Up Data from Your Cloud Accounts to a Local Device or External Hard Drive -- 4. Backup Using Your Operating System's Native Backup Application -- 5. Automatic Backup vs. Manual Backup.
F. Secure Your Cloud Data and Internet Accounts (and Back Them Up) -- 1. Secure Your Important Online Accounts -- 2. Secure Your "Unimportant Accounts" as Best You Can -- G. Consider Encryption to Secure Data on Your Local Device -- 1. To Encrypt or Not to Encrypt? That Is the Question -- 2. Encryption by the Application -- 3. File and Folder Encryption by the Operating System -- 4. Full Disk Encryption -- 5. Encryption Summary -- H. Organize Your Data-Your Files and Folders -- 1. Basic File Organization Concepts -- 2. Storage Location -- I. Conclusion -- CHAPTER 10 Secure Your Network and Internet Use -- A. Introduction -- B. Mentally Assess Your Home Network -- C. Identify Parts of Your Home Network -- D. Internet Connection -- E. Modem -- F. Router and Wi-Fi -- 1. Learn About Basic Wi-Fi Routing -- 2. Log In to Your Router Administration Portal -- 3. Secure Your Router Administration Username and Password -- 4. Update Router Firmware -- 5. Secure the Wi-Fi Network Password and Ensure the Network Is Encrypted -- 6. Evaluate Your Wi-Fi Network Name -- 7. Disable Wi-Fi Protected Setup -- 8. Disable Remote Access Features You Don't Need -- 9. Enable Your Router's Firewall (If Available) -- 10. Disable Universal Plug and Play If You Don't Need It -- 11. Run Your Router's Security Self-Assessment Function (If Available) -- 12. Enable a Guest Network on Your Router (If Available) -- 13. Check Your Router's Physical Security -- 14. Learn About Additional Router and Wi-Fi Security Features -- 15. Wi-Fi Router Conclusion -- G. Software Firewalls (Encore for Your Laptops and Desktops) -- H. Review Device Software That Accesses the Internet (Encore for What Is Phoning Home) -- I. How Your Data Is Transmitted -- J. Equipment on the Network -- 1. Printers, Scanners, Fax Machines, All-in-Ones, and More -- 2. Network Attached Storage.
K. The "Internet of Things" and Smart Homes -- L. Reduce Your Attack Surface: Disconnect When Not Needed -- M. More About Networks for the Very Curious -- 1. Windows Task Manager -- 2. Windows Resource Monitor -- 3. Windows Firewall -- 4. Windows Firewall with Advanced Security -- 5. Windows Commands Regarding Network Activity -- 6. Mac Applications and Commands Regarding Network Activity -- 7. Install a Free Software Firewall -- N. Conclusion -- CHAPTER 11 Secure Your Family, Children, and Seniors -- A. Introduction -- B. Children -- 1. Assessment -- 2. Your Parental "Privacy Policy" -- 3. Educating Your Child to Make Good Decisions -- 4. Reviewing Your Child's Devices and Computer Usage -- 5. Sample Guidelines or Rules of Conduct -- 6. Reviewing the Data That Is Posted About Your Children -- C. Seniors -- D. Conclusion -- CHAPTER 12 Secure Yourself When You Travel -- A. Introduction -- B. Devices and Travel -- 1. Preventing Loss or Theft -- 2. Using Someone Elses Device -- C. Internet Access and Travel -- D. Data and Travel -- 1. Data You Bring (Data at Rest) -- 2. Data You Access (Data in Transit) -- E. Miscellaneous Anti-Fraud When You Travel -- F. Special Considerations When Traveling to Certain Countries -- G. Conclusion -- CHAPTER 13 Secure the Work Office -- A. Introduction -- B. The Workplace Mental Assessment -- C. Physically Secure Your Office -- 1. Visitor Entry -- 2. Locks and Doors -- 3. Alarm Systems and Video Surveillance -- 4. The "Plain View" Doctrine in Your Office -- D. Securing Your Employees and Coworkers -- 1. Screening and the Insider Threat -- 2. Training -- 3. Shadow IT in the Office -- 4. Acceptable Use of Workplace Computers -- E. Secure the Devices in Your Office -- F. Secure the Data in Your Office -- 1. Network Storage Devices in Your Office -- 2. Documents and Data in the Cloud -- 3. E-mail -- 4. Data at Rest.
5. Data in Transit.
Record Nr. UNINA-9910825788303321
Bandler John  
Chicago, Illinois : , : ABA, Section of Science & Technology Law, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity law / / Jeff Kosseff
Cybersecurity law / / Jeff Kosseff
Autore Kosseff Jeff <1978->
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2017
Descrizione fisica 1 online resource (515 pages)
Disciplina 343.7309/99
Soggetto topico Computer security - Law and legislation - United States
Data protection - Law and legislation - United States
Hacking - United States - Prevention
Cyberterrorism - Prevention
Soggetto genere / forma Electronic books.
ISBN 1-119-23201-5
1-119-23202-3
1-119-23189-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910467529503321
Kosseff Jeff <1978->  
Hoboken, New Jersey : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity law / / Jeff Kosseff
Cybersecurity law / / Jeff Kosseff
Autore Kosseff Jeff <1978->
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2017
Descrizione fisica 1 online resource (526 pages)
Disciplina 343.7309/99
Collana THEi Wiley ebooks.
Soggetto topico Computer security - Law and legislation - United States
Cyberterrorism - Prevention
Data protection - Law and legislation - United States
Hacking - United States - Prevention
ISBN 1-119-23202-3
1-119-23189-2
1-119-23201-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Author xv Acknowledgment xvii About the Companion Website xix Introduction xxi 1 Data Security Laws and Enforcement Actions 1 1.1 FTC Data Security 2 1.1.1 Overview of Section 5 of the FTC Act 2 1.1.2 Wyndham: Does the FTC have Authority to Regulate Data Security under Section 5 of the FTC Act? 5 1.1.3 LabMD: What Constitutes "Unfair" or "Deceptive" Data Security? 9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. Visa 102 3 Cybersecurity Requirements for Specific Industries 105 3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule 106 3.1.1 Interagency Guidelines 106 3.1.2 Securities and Exchange Commission Regulation S-P 109 3.1.3 FTC Safeguards Rule 110 3.2 Financial Institutions and Creditors: Red Flag Rule 112 3.2.1 Financial Institutions or Creditors 116 3.2.2 Covered Accounts 116 3.2.3 Requirements for a Red Flag Identity Theft Prevention Program 117 3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS) 118 3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule 121 3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards 127 3.5.1 CIP-003-6: Cybersecurity - Security Management Controls 127 3.5.2 CIP-004-6: Personnel and Training 128 3.5.3 CIP-006-6: Physical Security of Cyber Systems 128 3.5.4 CIP-007-6: Systems Security Management 128 3.5.5 CIP-009-6: Recovery Plans for Cyber Systems 129 3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments 129 3.5.7 CIP-011-2: Information Protection 130 3.6 Nuclear Regulatory Commission Cybersecurity Regulations 130 4 Cybersecurity and Corporate Governance 133 4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies 134 4.1.1 10-K Disclosures: Risk Factors 135 4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A) 137 4.1.3 10-K Disclosures: Description of Business 137 4.1.4 10-K Disclosures: Legal Proceedings 138 4.1.5 10-K Disclosures: Examples 138 4.1.5.1 Wal-Mart 138 4.1.5.2 Berkshire Hathaway 143 4.1.5.3 Target Corp 144 4.1.6 Disclosing Data Breaches to Investors 147 4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches 150 4.3 Committee on Foreign Investment in the United States and Cybersecurity 152 4.4 Export Controls and the Wassenaar Arrangement 154 5 Anti-Hacking Laws 159 5.1 Computer Fraud and Abuse Act 160 5.1.1 Origins of the CFAA 160 5.1.2 Access without Authorization and Exceeding Authorized Access 161 5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization" 163 5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization" 167 5.1.2.3 Attempts to Find a Middle Ground 169 5.1.3 The Seven Sections of the CFAA 170 5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage 172 5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information 172 5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer 176 5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud 178 5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer 181 5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization 181 5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage 184 5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss 185 5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases 186 5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords 188 5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer 190 5.1.4 Civil Actions under the CFAA 193 5.1.5 Criticisms of the CFAA 195 5.2 State Computer Hacking Laws 198 5.3 Section 1201 of the Digital Millennium Copyright Act 201 5.3.1 Origins of Section 1201 of the DMCA 202 5.3.2 Three Key Provisions of Section 1201 of the DMCA 203 5.3.2.1 DMCA Section 1201(a)(1) 203 5.3.2.2 DMCA Section 1201(a)(2) 208 5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. Skylink Technologies 209 5.3.2.2.2 Broad Interpretation of Section (a)(2): MDY Industries, LLC v. Blizzard Entertainment, Inc.
211 5.3.2.3 DMCA Section 1201(b)(1) 215 5.3.3 Section 1201 Penalties 217 5.3.4 Section 1201 Exemptions 218 5.3.5 The First Amendment and DMCA Section 1201 224 5.4 Economic Espionage Act 227 5.4.1 Origins of the Economic Espionage Act 228 5.4.2 Criminal Prohibitions on Economic Espionage and Theft of Trade Secrets 229 5.4.2.1 Definition of "Trade Secret" 230 5.4.2.2 "Knowing" Violations of the Economic Espionage Act 234 5.4.2.3 Purpose and Intent Required under Section 1831: Economic Espionage 234 5.4.2.4 Purpose and Intent Required under Section 1832: Theft of Trade Secrets 236 5.4.3 Civil Actions for Trade Secret Misappropriation: The Defend Trade Secrets Act of 2016 238 5.4.3.1 Definition of "Misappropriation" 239 5.4.3.2 Civil Seizures 240 5.4.3.3 Injunctions 241 5.4.3.4 Damages 241 5.4.3.5 Statute of Limitations 242 6 Public-Private Cybersecurity Partnerships 243 6.1 U.S. Government's Civilian Cybersecurity Organization 244 6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015 245 6.3 Energy Department's Cyber-Threat Information Sharing 249 6.4 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework 250 6.5 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act 256 7 Surveillance and Cyber 259 7.1 Fourth Amendment 260 7.1.1 Was the Search or Seizure Conducted by a Government Entity or Government Agent? 261 7.1.2 Did the Search or Seizure Intrude Upon an Individual's Privacy Interests? 265 7.1.3 Did the Government have a Warrant? 269 7.1.4 If the Government Did Not Have a Warrant, Did an Exception to the Warrant Requirement Apply? 271 7.1.5 Was the Search or Seizure Reasonable under the Totality of the Circumstances? 273 7.2 Electronic Communications Privacy Act 275 7.2.1 Stored Communications Act 276 7.2.1.1 Section 2701: Third-Party Hacking of Stored Communications 278 7.2.1.2 Section 2702: Restrictions on Service Providers' Ability to Disclose Stored Communications and Records to the Government and Private Parties 279 7.2.1.2.1 The Cybersecurity Act of 2015: Allowing Service Providers to Disclose Cybersecurity Threats to the Government 282 7.2.1.3 Section 2703: Government's Ability to Force Service Providers to Turn Over Stored Communications and Customer Records 284 7.2.2 Wiretap Act 286 7.2.3 Pen Register Act 290 7.2.4 National Security Letters 291 7.3 Communications Assistance for Law Enforcement Act (CALEA) 293 7.4 Encryption and the All Writs Act 294 8 Cybersecurity and Federal Government Contractors 299 8.1 Federal Information Security Management Act 300 8.2 NIST Information Security Controls for Government Agencies and Contractors 301 8.3 Classified Information Cybersecurity 306 8.4 Covered Defense Information and Controlled Unclassified Information 309 9 Privacy Laws 317 9.1 Section 5 of the FTC Act and Privacy 318 9.2 Health Insurance Portability and Accountability Act 324 9.3 Gramm-Leach-Bliley Act and California Financial Information Privacy Act 326 9.4 CAN-SPAM Act 327 9.5 Video Privacy Protection Act 328 9.6 Children's Online Privacy Protection Act 330 9.7 California Online Privacy Laws 332 9.7.1 California Online Privacy Protection Act (CalOPPA) 332 9.7.2 California Shine the Light Law 333 9.7.3 California Minor "Eraser Law" 335 9.8 Illinois Biometric Information Privacy Act 337 10 International Cybersecurity Law 339 10.1 European Union 340 10.2 Canada 346 10.3 China 350 10.4 Mexico 353 10.5 Japan 356 Appendix A: Text of Section 5 of the FTC Act 361 Appendix B: Summary of State Data Breach Notification Laws 369 Appendix C: Text of Section 1201 of the Digital Millennium Copyright Act 413 Appendix D: Text of the Computer Fraud and Abuse Act 425 Appendix E: Text of the Electronic Communications Privacy Act 433 Index 485.
Record Nr. UNINA-9910648493503321
Kosseff Jeff <1978->  
Hoboken, New Jersey : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Accountability and Trust Act [[electronic resource] ] : report (to accompany H.R. 2221) (including cost estimate of the Congressional Budget Office)
Data Accountability and Trust Act [[electronic resource] ] : report (to accompany H.R. 2221) (including cost estimate of the Congressional Budget Office)
Pubbl/distr/stampa [Washington, D.C.] : , : [U.S. G.P.O.], , [2009]
Descrizione fisica 1 online resource (31 pages)
Collana Report / 111th Congress, 1st session, House of Representatives
Soggetto topico Data protection - Law and legislation - United States
Computer security - Law and legislation - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Data Accountability and Trust Act
Record Nr. UNINA-9910696956203321
[Washington, D.C.] : , : [U.S. G.P.O.], , [2009]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Breach Notification Act [[electronic resource] ] : report together with additional views (to accompany S. 139) (including cost estimate of the Congressional Budget Office)
Data Breach Notification Act [[electronic resource] ] : report together with additional views (to accompany S. 139) (including cost estimate of the Congressional Budget Office)
Pubbl/distr/stampa [Washington, D.C.] : , : [U.S. G.P.O.], , [2010]
Descrizione fisica 1 online resource (21 pages)
Collana Report / 111th Congress, 2d session, Senate
Soggetto topico Data protection - Law and legislation - United States
Disclosure of information - Law and legislation - United States
Privacy, Right of - United States
Computer security - Law and legislation - United States
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Data Breach Notification Act
Record Nr. UNINA-9910699647203321
[Washington, D.C.] : , : [U.S. G.P.O.], , [2010]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Cartels : The Companies That Control and Monopolize Our Information / / Sarah Lamdan
Data Cartels : The Companies That Control and Monopolize Our Information / / Sarah Lamdan
Autore Lamdan Sarah
Edizione [First edition.]
Pubbl/distr/stampa Stanford, California : , : Stanford University Press, , [2023]
Descrizione fisica 1 online resource (227 pages)
Disciplina 343.730999
Soggetto topico Antitrust law - United States
Cartels - United States
Data protection - Law and legislation - United States
Freedom of information - United States
Information services industry - Law and legislation - United States
Information services industry - Social aspects - United States
ISBN 1-5036-3372-1
Classificazione AK 54325
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction : the data cartels : an overview -- Data brokering -- Academic research -- Legal information -- Financial information -- News -- Conclusion : envisioning public information as a public good.
Record Nr. UNINA-9910795622303321
Lamdan Sarah  
Stanford, California : , : Stanford University Press, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Cartels : The Companies That Control and Monopolize Our Information / / Sarah Lamdan
Data Cartels : The Companies That Control and Monopolize Our Information / / Sarah Lamdan
Autore Lamdan Sarah
Edizione [First edition.]
Pubbl/distr/stampa Stanford, California : , : Stanford University Press, , [2023]
Descrizione fisica 1 online resource (227 pages)
Disciplina 343.730999
Soggetto topico Antitrust law - United States
Cartels - United States
Data protection - Law and legislation - United States
Freedom of information - United States
Information services industry - Law and legislation - United States
Information services industry - Social aspects - United States
ISBN 1-5036-3372-1
Classificazione AK 54325
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction : the data cartels : an overview -- Data brokering -- Academic research -- Legal information -- Financial information -- News -- Conclusion : envisioning public information as a public good.
Record Nr. UNINA-9910821345803321
Lamdan Sarah  
Stanford, California : , : Stanford University Press, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data ownership : exploring implications for data privacy rights and data valuation : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixteenth Congress, first session, on examining the concept of personal data ownership, including its efficacy on enhancing individuals' privacy and control over their personal information, October 24, 2019
Data ownership : exploring implications for data privacy rights and data valuation : hearing before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Sixteenth Congress, first session, on examining the concept of personal data ownership, including its efficacy on enhancing individuals' privacy and control over their personal information, October 24, 2019
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2021
Descrizione fisica 1 online resource (iii, 168 pages) : color illustrations
Collana S. hrg.
Soggetto topico Privacy, Right of - United States
Data protection - Law and legislation - United States
Consumer protection - Law and legislation - United States
Personal property - United States
Soggetto genere / forma Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Data ownership
Record Nr. UNINA-9910716824903321
Washington : , : U.S. Government Publishing Office, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data protection and taxpayers' rights : challenges created by automatic exchange of information / / Viktoria Wöhrer
Data protection and taxpayers' rights : challenges created by automatic exchange of information / / Viktoria Wöhrer
Autore Wöhrer Viktoria
Pubbl/distr/stampa Amsterdam, The Netherlands : , : IBFD, , 2018
Descrizione fisica 1 online resource (505 pages) : illustrations
Disciplina 342.240858
Collana European and international tax law and policy series
Soggetto topico Data protection - Law and legislation - United States
Data protection - Law and legislation - OECD countries
Data protection - Law and legislation - European Union countries
Tax administration and procedure - United States
Tax administration and procedure - OECD countries
Tax administration and procedure - European Union countries
Soggetto genere / forma Electronic books.
ISBN 90-8722-470-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910467914003321
Wöhrer Viktoria  
Amsterdam, The Netherlands : , : IBFD, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...