Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


This book is now Out of Print.
A new edition has been published, the details can be seen here:
Cyber Security Toolkit 2nd ed isbn 9781784461812

Cyber Security Toolkit


ISBN13: 9781784460426
New Edition ISBN: 9781784461812
Published: September 2016
Publisher: Law Society Publishing
Country of Publication: UK
Format: Paperback & CD-ROM
Price: Out of print



In today's digital world, law firms must ensure rigorous safeguarding of intellectual property, client dataand other legal information as a crucial part of business strategy.

Under Principle 10 of the SRA code,regulated firms have a responsibility to 'protect client money and assets' and cyber crime presents asignificant risk to this.

As a result, cyber security is becoming a central issue for professional indemnity insurers and firms arebeing asked to demonstrate what protections they have against cyber criminals before they are offered PI cover.

This practical toolkit covers both the law and its practical application and will help ensure that your firmhas effective policies and procedures in place to deal with cyber security. It will help your firm increaseawareness of and be prepared for cyber incidents and the threats they pose, as well as how to preventand deal with them. It will also offer assistance to help your staff comply with all their informationsecurity obligations.

As well as advice on how to safeguard digital information from both external and internal sources andexamples of how to deal with issues such as information breaches in the workplace, it provides a numberof precedents and templates on CD-ROM to ensure that your firms meets all of the legal and regulatoryrequirements to protect your personal and client data, such as:-

  • cyber crime risk audit
  • mobile technology policy
  • email security policy
  • IT security checklist.

Subjects:
Legal Practice Management
Contents:
1. Defining Cyber Security
2. Types of Cyber Attack
3. Legal Framework
4. Regulatory Standards
5. Consequences of a Cyber Security Breach
6. Effective Cyber Security Countermeasures
7. OfficeProcedure & Best Practice
8. Hardcopy data management
9. Knowledge sharing
10. Effective CyberSecurity Training & Assessment.