
Privacy and Cybersecurity Law Deskbook, 2021 Edition


Looseleaf

Internet

Privacy and Cybersecurity Law Deskbook
An essential compliance tool for every privacy officer and attorney involved in managing privacy and data security issues, Privacy and Cybersecurity Law Deskbook provides the thorough, practical, sector-specific guidance that helps you meet today's challenges and minimize the risk of data breaches that can damage a company's reputation.
Keep abreast of the latest developments to Identify to comply with privacy and cybersecurity laws—Across the country and around the world.
Only Privacy and Cybersecurity Law Deskbook makes it simple to:
- Comply with global data protection laws
- Navigate the various state-by-state breach notification requirements
- Keep completely current on emerging legal trends
Written by one of the world’s foremost legal practitioners in the field, Privacy and Cybersecurity Law Deskbook (formerly titled Privacy and Data Law Deskbook) has been updated in this 2021 Edition to include:
- The groundbreaking California Consumer Privacy Act of 2018
- Key information about the new data protection law in Brazil
- Updates to various global privacy laws, including new information about breach notification and data localization requirements
- Facebook’s $5 billion settlement with the FTC, the largest ever in connection with a consumer privacy action, to settle an investigation involving Cambridge Analytica
- Recent FTC enforcement actions for alleged privacy and information security violations, including Cambridge Analytica and YouTube
- Washington State’s new law establishing safeguards for the use of facial recognition technology by state and local government agencies
- Updates from HHS regarding the applicability of HIPAA to the COVID-19 pandemic response
- Information on biometric privacy laws in Illinois, Texas, and Washington State, and recent case law in the wake of litigation brought under Illinois’s Biometric Information Privacy Act (BIPA)
- The New York Stop Hacks and Improve Electronic Data Security (SHIELD) Act, imposing a reasonable security requirement on businesses that own or license computerized data that includes the private information of New York residents
- Recent FTC enforcement actions for violations of the Privacy Rule and Safeguards Rule under the Gramm-Leach-Bliley Act
- Recent HHS and state regulator enforcement actions addressing the privacy and security of protected health information, including first-of-its-kind multistate litigation involving a HIPAA-related data breach
Note: Online subscriptions are for three-month periods.
Previous Edition: Privacy and Cybersecurity Law Deskbook, 2020 Edition, ISBN 9781543812800
Pages | 1912 |
---|---|
Publish Date | 08/10/2020 |
Publish Frequency | Semi-annually |
Product Line | Wolters Kluwer Legal & Regulatory U.S. |
ISBN | 9781543824544 |
SKU | 10083493-7777 |
Publish Frequency | Semi-annually |
---|---|
Product Line | Wolters Kluwer Legal & Regulatory U.S. |
SKU | 000000000010048358 |
Preface | |
PART I | |
Chapter 1 | |
§1.01 | United States Privacy and Data Security Framework |
§1.02 | European Union Data Protection Framework |
§1.03 | Other Jurisdictions |
§1.04 | Data Localization |
§1.05 | Conclusion |
PART II | |
Chapter 2 | |
§2.01 | Introduction |
§2.02 | Fair Credit Reporting Act |
§2.03 | Fair and Accurate Credit Transactions Act |
Chapter 3 | |
§3.01 | Introduction to Financial Privacy |
§3.02 | Gramm-Leach-Bliley Act |
§3.03 | Cybersecurity Issues |
§3.04 | Social Media in the Financial Sector |
§3.05 | State Financial Privacy Laws |
§3.06 | Right to Financial Privacy Act of 1978 |
Chapter 4 | |
§4.01 | Introduction to Privacy of Health Information |
§4.02 | Health Insurance Portability and Accountability Act of 1996 |
§4.03 | Genetic Information Nondiscrimination Act of 2008 |
§4.04 | State Laws |
Chapter 5 | |
§5.01 | Introduction to Children's and Students' Privacy |
§5.02 | Children's Privacy |
§5.03 | Student Privacy |
Chapter 6 | |
§6.01 | Introduction to Telecommunications and Cable Privacy |
§6.02 | Telecommunications Act of 1996 |
§6.03 | Telephone Records and Privacy Protection Act |
§6.04 | Cable Subscriber Privacy Rules |
§6.05 | FCC Broadband Consumer Privacy Rules |
Chapter 7 | |
§7.01 | Introduction to the Driver's Privacy Protection Act |
§7.02 | Prohibitions and Exceptions |
§7.03 | Resale and Redisclosure of Personal Information |
§7.04 | Civil and Criminal Liability |
§7.05 | State Statutes |
§7.06 | Case Law |
Chapter 8 | |
§8.01 | Introduction to Privacy of Video Records |
§8.02 | Limitations on Disclosure |
§8.03 | Destruction of Personally Identifiable Information |
§8.04 | Competing Views on Applicability of the Law |
§8.05 | Personally Identifiable Information |
§8.06 | “Consumers” Under the VPPA |
§8.07 | Penalties |
§8.08 | Relationship of Federal Law to State Law |
Chapter 9 | |
§9.01 | Introduction to Marketing and Privacy |
§9.02 | Direct Postal Mail Marketing |
§9.03 | Email Marketing |
§9.04 | Telemarketing |
§9.05 | Mobile Marketing: SMS and MSCMs |
§9.06 | Facsimile Advertising |
§9.07 | California's “Shine the Light” Law |
§9.08 | California's Song-Beverly Credit Card Act of 1971 and Other State Analogs |
§9.09 | Online Behavioral Advertising |
§9.10 | Biometric and Geolocation Data |
§9.11 | Privacy Seal Programs |
§9.12 | Political Advertising |
Chapter 10 | |
§10.01 | Introduction to Workplace Privacy |
§10.02 | Labor and Employment Laws |
§10.03 | Background Screening of Employees and Applicants |
§10.04 | Disposal of Employee Personal Information |
§10.05 | Protection of Social Security Numbers |
§10.06 | Health Information |
§10.07 | Workplace Monitoring |
§10.08 | Privacy Torts |
Chapter 11 | |
§11.01 | Introduction to Privacy Policies |
§11.02 | Federal Requirements |
§11.03 | State Law |
§11.04 | FTC Enforcement Actions |
§11.05 | Case Law |
§11.06 | Conclusion |
Chapter 12 | |
§12.01 | Introduction to Surveillance Law |
§12.02 | Electronic Communications Privacy Act of 1986 |
§12.03 | Computer Fraud and Abuse Act |
§12.04 | Foreign Intelligence Surveillance Act |
§12.05 | State Surveillance Laws |
Chapter 13 | |
§13.01 | Introduction to Cybersecurity and Information Safeguards |
§13.02 | Gramm-Leach-Bliley Act |
§13.03 | Health Insurance Portability and Accountability Act of 1996 |
§13.04 | Cybersecurity Information Sharing Act of 2015 |
§13.05 | Federal Information Security Management Act |
§13.06 | Sarbanes-Oxley Act of 2002 |
§13.07 | Red Flags Rule |
§13.08 | State Information Security Requirements |
§13.09 | Records Disposal Requirements |
§13.10 | Anti-Spyware Laws |
§13.11 | ISO 27001 and 17799/27002 |
§13.12 | Statement on Standards for Attestation Engagements 16 and SOC 1, 2, and 3 Reports |
§13.13 | Payment Card Industry Data Security Standard |
§13.14 | FTC Internet of Things Guidance |
§13.15 | Federal Trade Commission “Start with Security” Guidance |
§13.16 | Cybersecurity Executive Orders |
§13.17 | Cybersecurity in the Financial Sector |
§13.18 | Cybersecurity Regulatory Developments Outside the United States |
§13.19 | Developing an Information Security Program |
§13.20 | Preventing Data Leaks |
§13.21 | Information Security Issues in Cloud Computing |
§13.22 | Ransomware Prevention and Response Guidance |
§13.23 | The Importance of Cybersecurity in Corporate Transactions |
§13.24 | The Role of the Board in Cybersecurity Governance |
Chapter 14 | |
§14.01 | Introduction to Data Breach Notification Laws |
§14.02 | State Security Breach Notification Requirements |
§14.03 | Federal Breach Notification Requirements |
§14.04 | How to Prepare for a Security Breach |
§14.05 | How to Respond to a Security Breach |
Chapter 15 | |
§15.01 | Introduction to the CCPA |
§15.02 | California Consumer Privacy Act of 2018 |
§15.03 | Other State Laws and Related Legislative Efforts |
Chapter 16 | |
§16.01 | Section 5 of the Federal Trade Commission Act |
§16.02 | Enforcement Under State “Little FTC Acts” |
Chapter 17 | |
§17.01 | Introduction to Privacy Torts |
§17.02 | Intrusion upon Seclusion |
§17.03 | Reasonable Expectation of Privacy |
§17.04 | Reduction of Damages |
§17.05 | Appropriation of Name or Likeness |
§17.06 | Public Disclosure of Private Facts |
§17.07 | False Light |
PART III | |
Chapter 18 | |
§18.01 | Introduction to European Union Data Protection Law |
§18.02 | EU Data Protection Framework |
Chapter 19 | |
§19.01 | Introduction to Select Global Privacy Laws |
§19.02 | Argentina |
§19.03 | Australia |
§19.04 | Brazil |
§19.05 | Canada |
§19.06 | China |
§19.07 | Dubai International Financial Centre |
§19.08 | Hong Kong |
§19.09 | India |
§19.10 | Israel |
§19.11 | Japan |
§19.12 | Mexico |
§19.13 | New Zealand |
§19.14 | Philippines |
§19.15 | Russia |
§19.16 | Singapore |
§19.17 | South Africa |
§19.18 | South Korea |
§19.19 | Taiwan |
§19.20 | Thailand |
Appendix A | |
Appendix B | |
Table of Cases | |
Index | |
Appendices A through N are found at: http://www.wolterskluwerlr.com/cyberAppendices | |
A Selected Security Breach Notification Laws | |
B Selected State Data Security Laws | |
C Selected State Records Disposal Laws | |
D Selected State Social Security Number Protection Laws | |
E Selected State Do-Not-Fax Laws | |
F Selected State Telephone-Monitoring Laws | |
G Federal Trade Commission: Selected Section 5 Enforcement Actions | |
H Model GLB Notices | |
I HIPAA Model Notices of Privacy Practices | |
J HIPAA Model Business Associate Contracts | |
K EU Standard Contractual Clauses | |
L Binding Corporate Rules: Official Documents | |
M EU-U.S. Privacy Shield: Principles and Supplemental Principles | |
N APEC Privacy Framework |
See what our clients are saying:
“Lisa Sotto has done the field an enormous service by gathering and analyzing the myriad standards that apply to data. This is an indispensable tool for anyone working in the field of privacy.”
—TREVOR HUGHES, PRESIDENT AND CEO, International Association of Privacy Professionals