Cyber Security: Law and Guidance

ISBN: 9781526505866

Paperback

£125
Buy Now

Law Online Subscription

FREE
Free Trial

About Cyber Security: Law and Guidance

What is cyber security? Cyber security is concerned with both the security of cyber space and the security of entities that use or rely on cyber space such as: – The internet and the world-wide web. – The facilities and apparatus that underpin and connect the internet and the world-wide web (for example, telecommunications, internet access and internet service provision). – The facilities and apparatus that support the provision of... Read more

Review

-

About Cyber Security: Law and Guidance

What is cyber security?

Cyber security is concerned with both the security of cyber space and the security of entities that use or rely on cyber space such as:

– The internet and the world-wide web.
– The facilities and apparatus that underpin and connect the internet and the world-wide web (for example, telecommunications, internet access and internet service provision).
– The facilities and apparatus that support the provision of content available through the internet and the world-wide web.
– The facilities and apparatus that support data processing and data storage accessible through the internet and the world-wide web (for example, cloud computing services and the supporting infrastructure, such as data centres).
ยท Cyber space also includes physical places as well as purely virtual ones.

Entities that use cyber space need to be cyber secure. However, the regulatory reform process for cyber security in the EU, the US and elsewhere has been very selective about the categories of entities that should carry a statutory duty to be cyber secure.

Cyber Security: Law and Guidance provides an overview of the key legal developments for cyber security in England and Wales, focusing on the proposed NIS Directive and related legal instruments, including those for data protection and payment services. It also provides insights into how the law is developed outside of regulatory frameworks, by reference to the “consensus of professional opinion” on cyber security, case law and the role of professional and industry standards for security.

Suggestions are made on how to build a “defensive shield” to protect an organisation from regulatory actions and litigation. With cyber security law destined to become heavily contentious, legal privilege will be an advantage.

Organisations require expert assistance to operationalise these matters and Cyber Security: Law and Guidance provides this assistance.

Table of Contents

Chapter 1: Introduction – Helen Tse
Chapter 2: Threats – Steven Butterworth
Chapter 3: Vulnerabilities – Steven Butterworth
Chapter 4: The Law – Ria Halme
Chapter 5: Cyber Security – Owen Brendan
Chapter 6: Cyber Secuirty in the Workplace – Ria Halme
Chapter 7: Card Data
Chapter 8: Unauthorised Software – Dr Benjamin Saunders
Chapter 9: Cyber Security Companies and their Involvement
Chapter 10: Corporate Governance – Andrew Constantine
Chapter 11: Industries
Chapter 12: Trade Secrets – Jane Lambert
Chapter 13: International Law and Interaction Bewteen States – Benjamin Ang
Chapter 14: Internet of Things and Cyber Security
Chapter 15: The Liquid Enemy – Managing Cyber Risks in a Financial Institution – Cosimo Pacciani
Chapter 16: Employee Liability and Protection – Sally Penni
Chapter 17: Data Security – Ryan Mackie
Chapter 18: Data Classification – Reza Alvi
Chapter 19: Liability Following a Data Breach – Mark Deem
Chapter 20: Criminal Law – Jill Lorimer and William Christopher
Chapter 21: Immunity, the Locus and Standing of the Accused
Chapter 22: Policing of Cyber Crime – Professor Victora Wang and Barry Loveday
Chapter 23: Sample Legal Documents
Chapter 24: The Government’s National Response
Chapter 25: M&A Corporate Due Diligence and Cyber Security Issues
Chapter 26: How to Defence – Graeme Batsman
Chapter 27: Protecting Organisations – Gary Hibberd
Chapter 28: Deter – Lisa Forte
Chapter 29: Development of Cyber Security Practices – Dr Maria Pozza
Chapter 30: Behavioural Science in Cyber Securuty – Leron Zinatullin
Chapter 31: Agile Cyber Security Process Capability – Lanre Rotimi
Chapter 32: Social Media and Cyber Security – Susan Hall
Chapter 33: Cyber Secret, Life Secrets: On the Verge of Human Science – Arthur Keleti
Chapter 34: Bridging the Gap between Mission, Technology and Security – William McBurrough
Chapter 35: Conclusion – Helen Tse

Publishing Details

Publication Date: 13 September 2018
ISBN: 9781526505866
Binding: paperback
Edition: 1

Law Online

Online research for solicitors and barristers practising in English law Free Trial