Store International Cybersecurity and Privacy Law in Practice
International Cybersecurity and Privacy Law in Practice by TSCHIDER

International Cybersecurity and Privacy Law in Practice

By Charlotte A. Tschider


Add to Cart
* For general delivery times, please see our Shipping Policy

International Cybersecurity and Privacy Law in Practice balances privacy and cybersecurity legal knowledge with technical knowledge and business acumen needed to provide adequate representation and consultation both within an organization, such as a government entity or business, and when advising these organizations as external counsel. Although organizations collect information, including personal data, in increasing volume, they often struggle to identify privacy laws applicable to complex, multinational technology implementations. Jurisdictions worldwide now include specific cybersecurity obligations in privacy laws and have passed stand-alone cybersecurity laws. To advise on these compliance matters, attorneys must understand both the law and the technology to which it applies. This book provides an innovative, in-depth survey and analysis of international information privacy and cybersecurity laws worldwide, an introduction to cybersecurity technology, and a detailed guide on organizational practices to protect an organization’s interests and anticipate future compliance developments. It also introduces cybersecurity industry standards, developing cybersecurity legal developments, and international data localization laws.

What’s in this book:

This book explores international information privacy laws applicable to private and public organizations, including employment and marketing-related compliance requirements and industry-specific guidance. It introduces a legal approach based on industry best practices to creating and managing an effective cybersecurity and privacy program that includes the following and more:

  • prompt, secure ways to identify threats, manage vulnerabilities, and respond to “incidents”;
  • defining the accountability of the “data controller” within an organization;
  • roles of transparency and consent;
  • privacy notice as contract;
  • rights of revocation, erasure, and correction;
  • de-identification and anonymization procedures;
  • records retention; and
  • data localization.

Regulations and applicable “soft law” will be explored in detail for a wide variety of jurisdictions, including an introduction to the European Union’s Global Data Protection Regulation (GDPR), China’s Cybersecurity Law, the OECD and APEC Guidelines, the U.S. Health Insurance Portability and Accountability Act (HIPAA), and many other national and regional instruments.

How this will help you:

This book is an indispensable resource for attorneys who must advise on strategic implementation of new technologies, advise on the impact of certain laws to the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities. It will also be of value to other practitioners from a broader perspective, such as compliance and security personnel, who need a reference exploring privacy and data protection laws and their connection with security technologies.

Pages 448
Publish Date 12/04/2017
Publish Frequency As Needed
Product Line Kluwer Law International
ISBN 9789041188410
SKU 10058017-0001
Table of Contents

About the Author


List of Abbreviations

List of Figures

List of Tables



Part I

Information Privacy Law and Practice

Chapter 1

Introduction to Information Privacy Law and Practice

Chapter 2

European Region, European Economic Area, and Canada

Chapter 3

United States

Chapter 4

Latin America Region

Chapter 5

Asia-Pacific Region

Chapter 6

The Middle East and Africa

Chapter 7

Privacy Programs and Practical Strategies

Part II

Cybersecurity Law and Practice

Chapter 8

Introduction to Cybersecurity and Information Technology

Chapter 9

Security Technologies

Chapter 10

Cybersecurity Statutory Obligations

Chapter 11

Information Security Programs and Practical Strategies

Chapter 12

Security Process Development

Chapter 13

Incident Response and Attack Types

Part III

Managing Privacy and Security Legal Risk

Chapter 14

Managing Legal Risk

Chapter 15

Data Breach Notification

Chapter 16

Synthesizing Information Privacy and Cybersecurity