Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


International Cybersecurity and Privacy Law in Practice 2nd ed (eBook)


ISBN13: 9789403532141
Published: August 2023
Publisher: Kluwer Law International
Country of Publication: The Netherlands
Format: eBook (ePub)
Price: £167.00
The amount of VAT charged may change depending on your location of use.


The sale of some eBooks are restricted to certain countries. To alert you to such restrictions, please select the country of the billing address of your credit or debit card you wish to use for payment.

Billing Country:


Sale prohibited in
Korea, [North] Democratic Peoples Republic Of

Due to publisher restrictions, international orders for ebooks may need to be confirmed by our staff during shop opening hours. Our trading hours are Monday to Friday, 8.30am to 5.00pm, London, UK time.


The device(s) you use to access the eBook content must be authorized with an Adobe ID before you download the product otherwise it will fail to register correctly.

For further information see https://www.wildy.com/ebook-formats


Once the order is confirmed an automated e-mail will be sent to you to allow you to download the eBook.

All eBooks are supplied firm sale and cannot be returned. If you believe there is a fault with your eBook then contact us on ebooks@wildy.com and we will help in resolving the issue. This does not affect your statutory rights.

This eBook is available in the following formats: ePub.

In stock.
Need help with ebook formats?




Also available as

International Cybersecurity and Privacy Law in Practice, currently in its second edition, is a crucial book—which has now been extensively updated to reflect the dramatic legal changes that have taken place in the few short years since its first edition—remains the prominent in-depth survey and analysis of privacy and cybersecurity laws globally. As jurisdictions increasingly pass new cybersecurity and privacy laws, attorneys must secure a working knowledge of information technology to effectively advise organizations that collect and process data. This essential book also furnishes a deeply informed guide on how to apply legal requirements to protect an organization’s interests and anticipate future compliance developments.

What’s in this book:

With meticulous attention to relevant supranational, regional, and national privacy and data protection laws and frameworks, the author describes and analyzes the legal strategies and responsibilities attached to the following and more:

  • prompt, secure ways to identify threats, manage vulnerabilities, and respond to “incidents” and data breaches
  • most common types of cyberattacks used today
  • transparency and consent
  • rights of revocation, erasure, and correction
  • de-identification and anonymization procedures
  • data localization
  • cross-jurisdictional data transfer
  • contract negotiation
  • encryption, de-identification, anonymization, and pseudonymization, and
  • Artificial Intelligence as an emerging technology that will require more dynamic and challenging conversations

How this will help you:

Balancing legal knowledge with technical awareness and business acumen, this book is an indispensable resource for attorneys who must provide advice on strategic implementations of new technologies, advise on the impact of certain laws on the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities. It will also prove invaluable to other practitioners, such as security personnel and compliance professionals, who will benefit from a broad perspective exploring privacy and data protection laws and their connection with security technologies and broader organizational compliance objectives.

Subjects:
Data Protection, eBooks, IT, Internet and Artificial Intelligence Law
Contents:
Preface
List of Abbreviations
List of Figures
List of Tables
Acknowledgments
Introduction

PART I: Information Privacy Law and Practice
CHAPTER 1. Introduction to Information Privacy Law and Practice
CHAPTER 2. European Region, European Economic Area, and Canada
CHAPTER 3. United States & Canada
CHAPTER 4. Latin America Region
CHAPTER 5. Asia-Pacific Region
CHAPTER 6. The Middle East and Africa
CHAPTER 7. Privacy Programs and Practical Strategies

PART II: Cybersecurity Law and Practice
CHAPTER 8. Introduction to Cybersecurity and Information Technology
CHAPTER 9. Security Technologies
CHAPTER 10. Cybersecurity Statutory Obligations
CHAPTER 11. Information Security Programs and Practical Strategies
CHAPTER 12. Security Process Development
CHAPTER 13. Incident Response and Attack Types

PART III: Managing Privacy and Security Legal Risk
CHAPTER 14. Managing Legal Risk
CHAPTER 15. Data Breach Notification

Index