Atnaujinkite slapukų nuostatas

Cybersecurity Law [Kietas viršelis]

  • Formatas: Hardback, 528 pages, aukštis x plotis x storis: 235x166x33 mm, weight: 868 g
  • Išleidimo metai: 28-Feb-2017
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119231507
  • ISBN-13: 9781119231509
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 528 pages, aukštis x plotis x storis: 235x166x33 mm, weight: 868 g
  • Išleidimo metai: 28-Feb-2017
  • Leidėjas: John Wiley & Sons Inc
  • ISBN-10: 1119231507
  • ISBN-13: 9781119231509
Kitos knygos pagal šią temą:
A definitive guide to cybersecurity law Expanding on the author s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commission s cybersecurity cases in order to provide the background of the FTC s views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly. Featuring an overview of the laws that allow coordination between the public and private sectors as well as the tools that regulators have developed to allow a limited amount of collaboration, this book also: Addresses current U.S. and international laws, regulations, and court opinions that define the field of cybersecurity including the security of sensitive information, such as financial data and health information Discusses the cybersecurity requirements of the largest U.S. trading partners in Europe, Asia, and Latin America, and specifically addresses how these requirements are similar to (and differ from) those in the U.S. Provides a compilation of many of the most important cybersecurity statutes and regulations Emphasizes the compliance obligations of companies with in-depth analysis of crucial U.S. and international laws that apply to cybersecurity issues Examines government surveillance laws and privacy laws that affect cybersecurity as well as each of the data breach notification laws in 47 states and the District of Columbia Includes numerous case studies and examples throughout to aid in classroom use and to help readers better understand the presented material Supplemented with a companion website that features in-class discussion questions and timely and recent updates on recent legislative developments as well as information on interesting cases on relevant and significant topics Cybersecurity Law is appropriate as a textbook for undergraduate and graduate-level courses in cybersecurity, cybersecurity law, cyber operations, management-oriented information technology (IT), and computer science. This book is also an ideal reference for lawyers, IT professionals, government personnel, business managers, IT management personnel, auditors, and cybersecurity insurance providers. JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He frequently speaks and writes about cybersecurity and was a journalist covering technology and politics at The Oregonian, a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
About the Author xv
Acknowledgment xvii
About the Companion Website xix
Introduction xxi
1 Data Security Laws and Enforcement Actions 1(50)
1.1 FTC Data Security
2(34)
1.1.1 Overview of Section 5 of the FTC Act
2(3)
1.1.2 Wyndham: Does the FTC have Authority to Regulate Data Security under Section 5 of the FTC Act?
5(4)
1.1.3 LabMD: What Constitutes "Unfair" or "Deceptive" Data Security?
9(2)
1.1.4 FTC June 2015 Guidance on Data Security
11(3)
1.1.5 FTC Protecting Personal Information Guide
14(1)
1.1.6 Lessons from FTC Cybersecurity Complaints
15(21)
1.1.6.1 Failure to Secure Highly Sensitive Information
16(8)
1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data
16(1)
1.1.6.1.2 Routine Audits and Penetration Testing are Expected
17(1)
1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards
18(1)
1.1.6.1.4 Data Security Protection Extends to Paper Documents
19(1)
1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data
20(2)
1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors
22(1)
1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data
23(1)
1.1.6.1.8 Privacy Matters, Even in Data Security
23(1)
1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties
24(1)
1.1.6.2 Failure to Secure Payment Card Information
24(6)
1.1.6.2.1 Adhere to Security Claims about Payment Card Data
24(1)
1.1.6.2.2 Always Encrypt Payment Card Data
25(1)
1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest
26(1)
1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks
26(2)
1.1.6.2.5 Minimize Duration of Storage of Payment Card Data
28(1)
1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software
29(1)
1.1.6.2.7 Apps Should Never Override Default App Store Security Settings
29(1)
1.1.6.3 Failure to Adhere to Security Claims
30(7)
1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities
30(1)
1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy
31(2)
1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading
33(1)
1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices
33(1)
1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures
34(1)
1.1.6.3.6 Adhere to Promises about Encryption
35(1)
1.2 State Data Breach Notification Laws
36(6)
1.2.1 When Consumer Notifications are Required
37(3)
1.2.1.1 Definition of Personal Information
37(1)
1.2.1.2 Encrypted Data
38(1)
1.2.1.3 Risk of Harm
39(1)
1.2.1.4 Safe Harbors and Exceptions to Notice Requirement
39(1)
1.2.2 Notice to Individuals
40(2)
1.2.2.1 Timing of Notice
40(1)
1.2.2.2 Form of Notice
40(1)
1.2.2.3 Content of Notice
41(1)
1.2.3 Notice to Regulators and Consumer Reporting Agencies
41(1)
1.2.4 Penalties for Violating State Breach Notification Laws
42(1)
1.3 State Data Security Laws
42(7)
1.3.1 Oregon
43(2)
1.3.2 Rhode Island
45(1)
1.3.3 Nevada
45(1)
1.3.4 Massachusetts
46(3)
1.4 State Data Disposal Laws
49(2)
2 Cybersecurity Litigation 51(54)
2.1 Article III Standing
52(12)
2.1.1 Applicable Supreme Court Rulings on Standing
53(4)
2.1.2 Lower Court Rulings on Standing in Data Breach Cases
57(7)
2.1.2.1 Injury-in-Fact
57(5)
2.1.2.1.1 Broad View of Injury-in-Fact
57(3)
2.1.2.1.2 Narrow View of Injury-in-Fact
60(2)
2.1.2.2 Fairly Traceable
62(1)
2.1.2.3 Redressability
63(1)
2.2 Common Causes of Action Arising from Data Breaches
64(20)
2.2.1 Negligence
64(6)
2.2.1.1 Legal Duty and Breach of Duty
65(2)
2.2.1.2 Cognizable Injury
67(2)
2.2.1.3 Causation
69(1)
2.2.2 Negligent Misrepresentation or Omission
70(2)
2.2.3 Breach of Contract
72(4)
2.2.4 Breach of Implied Warranty
76(4)
2.2.5 Invasion of Privacy by Publication of Private Facts
80(1)
2.2.6 Unjust Enrichment
81(1)
2.2.7 State Consumer Protection Laws
82(2)
2.3 Class Action Certification in Data Breach Litigation
84(6)
2.4 Insurance Coverage for Cybersecurity Incidents
90(4)
2.5 Protecting Cybersecurity Work Product and Communications from Discovery
94(11)
2.5.1 Attorney-Client Privilege
96(2)
2.5.2 Work Product Doctrine
98(3)
2.5.3 Non-Testifying Expert Privilege
101(1)
2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. Visa
102(3)
3 Cybersecurity Requirements for Specific Industries 105(28)
3.1 Financial Institutions: Gramm-Leach-Bliley Act Safeguards Rule
106(6)
3.1.1 Interagency Guidelines
106(3)
3.1.2 Securities and Exchange Commission Regulation S-P
109(1)
3.1.3 FTC Safeguards Rule
110(2)
3.2 Financial Institutions and Creditors: Red Flag Rule
112(6)
3.2.1 Financial Institutions or Creditors
116(1)
3.2.2 Covered Accounts
116(1)
3.2.3 Requirements for a Red Flag Identity Theft Prevention Program
117(1)
3.3 Companies that use Payment and Debit Cards: Payment Card Industry Data Security Standard (PCI DSS)
118(3)
3.4 Health Providers: Health Insurance Portability and Accountability Act (HIPAA) Security Rule
121(6)
3.5 Electric Utilities: Federal Energy Regulatory Commission Critical Infrastructure Protection Reliability Standards
127(3)
3.5.1 CIP-003-6: Cybersecurity - Security Management Controls
127(1)
3.5.2 CIP-004-6: Personnel and Training
128(1)
3.5.3 CIP-006-6: Physical Security of Cyber Systems
128(1)
3.5.4 CIP-007-6: Systems Security Management
128(1)
3.5.5 CIP-009-6: Recovery Plans for Cyber Systems
129(1)
3.5.6 CIP-010-2: Configuration Change Management and Vulnerability Assessments
129(1)
3.5.7 CIP-011-2: Information Protection
130(1)
3.6 Nuclear Regulatory Commission Cybersecurity Regulations
130(3)
4 Cybersecurity and Corporate Governance 133(26)
4.1 Securities and Exchange Commission Cybersecurity Expectations for Publicly Traded Companies
134(16)
4.1.1 10-K Disclosures: Risk Factors
135(2)
4.1.2 10-K Disclosures: Management's Discussion and Analysis of Financial Condition and Results of Operations (MD&A)
137(1)
4.1.3 10-K Disclosures: Description of Business
137(1)
4.1.4 10-K Disclosures: Legal Proceedings
138(1)
4.1.5 10-K Disclosures: Examples
138(22)
4.1.5.1 Wal-Mart
138(5)
4.1.5.2 Berkshire Hathaway
143(1)
4.1.5.3 Target Corp
144(3)
4.1.6 Disclosing Data Breaches to Investors
147(3)
4.2 Fiduciary Duty to Shareholders and Derivative Lawsuits Arising from Data Breaches
150(2)
4.3 Committee on Foreign Investment in the United States and Cybersecurity
152(2)
4.4 Export Controls and the Wassenaar Arrangement
154(5)
5 Anti-Hacking Laws 159(84)
5.1 Computer Fraud and Abuse Act
160(38)
5.1.1 Origins of the CFAA
160(1)
5.1.2 Access without Authorization and Exceeding Authorized Access
161(9)
5.1.2.1 Narrow View of "Exceeds Authorized Access" and "Without Authorization"
163(4)
5.1.2.2 Broader View of "Exceeds Authorized Access" and "Without Authorization"
167(2)
5.1.2.3 Attempts to Find a Middle Ground
169(1)
5.1.3 The Seven Sections of the CFAA
170(23)
5.1.3.1 CFAA Section (a)(1): Hacking to Commit Espionage
172(1)
5.1.3.2 CFAA Section (a)(2): Hacking to Obtain Information
172(4)
5.1.3.3 CFAA Section (a)(3): Hacking a Federal Government Computer
176(2)
5.1.3.4 CFAA Section (a)(4): Hacking to Commit Fraud
178(3)
5.1.3.5 CFAA Section (a)(5): Hacking to Damage a Computer
181(7)
5.1.3.5.1 CFAA Section (a)(5)(A): Knowing Transmission that Intentionally Damages a Computer Without Authorization
181(3)
5.1.3.5.2 CFAA Section (a)(5)(B): Intentional Access Without Authorization that Recklessly Causes Damage
184(1)
5.1.3.5.3 CFAA Section (a)(5)(C): Intentional Access Without Authorization that Causes Damage and Loss
185(1)
5.1.3.5.4 CFAA Section (a)(5): Requirements for Felony and Misdemeanor Cases
186(2)
5.1.3.6 CFAA Section (a)(6): Trafficking in Passwords
188(2)
5.1.3.7 CFAA Section (a)(7): Threatening to Damage or Obtain Information from a Computer
190(3)
5.1.4 Civil Actions under the CFAA
193(2)
5.1.5 Criticisms of the CFAA
195(3)
5.2 State Computer Hacking Laws
198(3)
5.3 Section 1201 of the Digital Millennium Copyright Act
201(26)
5.3.1 Origins of Section 1201 of the DMCA
202(1)
5.3.2 Three Key Provisions of Section 1201 of the DMCA
203(24)
5.3.2.1 DMCA Section 1201(a)(1)
203(5)
5.3.2.2 DMCA Section 1201(a)(2)
208(7)
5.3.2.2.1 Narrow Interpretation of Section (a)(2): Chamberlain Group v. Skylink Technologies
209(2)
5.3.2.2.2 Broad Interpretation of Section (a)(2): MDY Industries, LLC v. Blizzard Entertainment, Inc
211(4)
5.3.2.3 DMCA Section 1201(b)(1)
215(2)
5.3.3 Section 1201 Penalties
217(1)
5.3.4 Section 1201 Exemptions
218(6)
5.3.5 The First Amendment and DMCA Section 1201
224(3)
5.4 Economic Espionage Act
227(16)
5.4.1 Origins of the Economic Espionage Act
228(1)
5.4.2 Criminal Prohibitions on Economic Espionage and Theft of Trade Secrets
229(9)
5.4.2.1 Definition of "Trade Secret"
230(4)
5.4.2.2 "Knowing" Violations of the Economic Espionage Act
234(1)
5.4.2.3 Purpose and Intent Required under Section 1831: Economic Espionage
234(2)
5.4.2.4 Purpose and Intent Required under Section 1832: Theft of Trade Secrets
236(2)
5.4.3 Civil Actions for Trade Secret Misappropriation: The Defend Trade Secrets Act of 2016
238(22)
5.4.3.1 Definition of "Misappropriation"
239(1)
5.4.3.2 Civil Seizures
240(1)
5.4.3.3 Injunctions
241(1)
5.4.3.4 Damages
241(1)
5.4.3.5 Statute of Limitations
242(1)
6 Public-Private Cybersecurity Partnerships 243(16)
6.1 U.S. Government's Civilian Cybersecurity Organization
244(1)
6.2 Department of Homeland Security Information Sharing under the Cybersecurity Act of 2015
245(4)
6.3 Energy Department's Cyber-Threat Information Sharing
249(1)
6.4 Critical Infrastructure Executive Order and the National Institute of Standards and Technology's Cybersecurity Framework
250(6)
6.5 U.S. Military Involvement in Cybersecurity and the Posse Comitatus Act
256(3)
7 Surveillance and Cyber 259(40)
7.1 Fourth Amendment
260(15)
7.1.1 Was the Search or Seizure Conducted by a Government Entity or Government Agent?
261(4)
7.1.2 Did the Search or Seizure Intrude Upon an Individual's Privacy Interests?
265(4)
7.1.3 Did the Government have a Warrant?
269(2)
7.1.4 If the Government Did Not Have a Warrant, Did an Exception to the Warrant Requirement Apply?
271(2)
7.1.5 Was the Search or Seizure Reasonable under the Totality of the Circumstances?
273(2)
7.2 Electronic Communications Privacy Act
275(18)
7.2.1 Stored Communications Act
276(10)
7.2.1.1 Section 2701: Third-Party Hacking of Stored Communications
278(1)
7.2.1.2 Section 2702: Restrictions on Service Providers' Ability to Disclose Stored Communications and Records to the Government and Private Parties
279(5)
7.2.1.2.1 The Cybersecurity Act of 2015: Allowing Service Providers to Disclose Cybersecurity Threats to the Government
282(2)
7.2.1.3 Section 2703: Government's Ability to Force Service Providers to Turn Over Stored Communications and Customer Records
284(2)
7.2.2 Wiretap Act
286(4)
7.2.3 Pen Register Act
290(1)
7.2.4 National Security Letters
291(2)
7.3 Communications Assistance for Law Enforcement Act (CALEA)
293(1)
7.4 Encryption and the All Writs Act
294(5)
8 Cybersecurity and Federal Government Contractors 299(18)
8.1 Federal Information Security Management Act
300(1)
8.2 NIST Information Security Controls for Government Agencies and Contractors
301(5)
8.3 Classified Information Cybersecurity
306(3)
8.4 Covered Defense Information and Controlled Unclassified Information
309(8)
9 Privacy Laws 317(22)
9.1 Section 5 of the FTC Act and Privacy
318(6)
9.2 Health Insurance Portability and Accountability Act
324(2)
9.3 Gramm-Leach-Bliley Act and California Financial Information Privacy Act
326(1)
9.4 CAN-SPAM Act
327(1)
9.5 Video Privacy Protection Act
328(2)
9.6 Children's Online Privacy Protection Act
330(2)
9.7 California Online Privacy Laws
332(5)
9.7.1 California Online Privacy Protection Act (CalOPPA)
332(1)
9.7.2 California Shine the Light Law
333(2)
9.7.3 California Minor "Eraser Law"
335(2)
9.8 Illinois Biometric Information Privacy Act
337(2)
10 International Cybersecurity Law 339(22)
10.1 European Union
340(6)
10.2 Canada
346(4)
10.3 China
350(3)
10.4 Mexico
353(3)
10.5 Japan
356(5)
Appendix A: Text of Section 5 of the FTC Act 361(8)
Appendix B: Summary of State Data Breach Notification Laws 369(44)
Appendix C: Text of Section 1201 of the Digital Millennium Copyright Act 413(12)
Appendix D: Text of the Computer Fraud and Abuse Act 425(8)
Appendix E: Text of the Electronic Communications Privacy Act 433(52)
Index 485
JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He frequently speaks and writes about cybersecurity and was a journalist covering technology and politics at The Oregonian, a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.