Cyber Security: Law and Guidance

Cyber Security: Law and Guidance cover


Implementing appropriate security measures will be an advantage when protecting organisations from regulatory action and litigation in cyber security law: can you provide a defensive shield?

Cyber Security: Law and Guidance provides an overview of legal developments in cyber security and data protection in the European Union and the United Kingdom, focusing on the key cyber security laws and related legal instruments, including those for data protection and payment services.

Additional context is provided through insight into how the law is developed outside the regulatory frameworks, referencing the 'Consensus of Professional Opinion' on cyber security, case law and the role of professional and industry standards for security.

With cyber security law destined to become heavily contentious, upholding a robust security framework will become an advantage and organisations will require expert assistance to operationalise matters.

Practical in approach, this comprehensive text will be invaluable for legal practitioners and organisations. It covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security.

Topics include:
- Threats and vulnerabilities
- Privacy and security in the workplace and built environment
- Importance of policy and guidance in digital communications
- Industry specialists' in-depth reports
- Social media and cyber security
- International law and interaction between states
- Data security and classification
- Protecting organisations
- Cyber security: cause and cure

Cyber Security: Law and Guidance is on the indicative reading list of the University of Kent's Cyber Law module.

This title is included in Bloomsbury Professional's Cyber Law and Intellectual Property and IT online service.

Table of Contents

Chapter 1. Threats - Melanie Oldham and Abigail McAlpine (with "Script Kiddies" by Gary Broadfield)
Chapter 2. Vulnerabilities - Melanie Oldham and Abigail McAlpine
Chapter 3. The Law - Ria Halme (with "Territorial Scope" by Gary Broadfield)
Chapter 4. How to Defend - Graeme Batsman
Chapter 5. Privacy and Security in The Workplace - Ria Halme
Chapter 6. Security in The Built Environment - Nathan Jones
Chapter 7. The Importance of Policy and Guidance in Digital Communications - Ben Silverstone
Chapter 8. The C Suite Perspective on Cyber Risk - Klaus Julisch
Chapter 9. Corporate Governance Mind Map - Andrew Constantine
Chapter 10. Industry Specialists In-Depth Reports
- Mobile Payments - Rhiannon Lewis
- Electric Utilities: Critical Infrastructure Protection and Reliability - E. Rudina and S. Kort
- Manufactuting - Filippo Mauri
- Think Money Group and UK Financial Services - Steven Peacock
- Towards Ennergy 4.0 - Stefano Bracco
- Aerospace, Defence and Security Sector - Simon Goldsmith
- Banking - in the Emirates - Yazid Khandhadia
- Healthcare - Helen Wong MBE
- Medical Devices - Helen Wong MBE
Chapter 11. Social Media and Cyber Security - Susan Hall
Chapter 12. International Law and Interaction Between States - Dr Benjamin Ang
Chapter 13. Security Concerns with The Internet of Things - Kevin Curran
Chapter 14. Managing Cyber-Security in An International Financial Institution - Cosimo Pacciani
Chapter 15. Employee Liability and Protection - Sally Penni
Chapter 16. Data Security – The New Oil - Ryan Mackie
Chapter 17. Data Classification - Reza Alvi
Chapter 18. Liability Following A Data Breach - Mark Deem
Chapter 19. Criminal Law - Jill Lorimer and William Christopher
Chapter 20. The Digital Next Way - Mark Blackhurst
Chapter 21. Intelligence and The Monitoring of Everyday Life - Dr Victoria Wang and Professor John V. Tucker
Chapter 22. Collaboration: Results? - David Clarke
Chapter 23. Cybersecurity: The Cause and The Cure - Kevin Murphy
Chapter 24. Mergers and Acquisitions Corporate Due Diligence and Cyber Security Issues - Vijay Rathour
Chapter 25. Protecting Organisations - Gary Hibberd
Chapter 26. Public Private Partnerships - E. Rudina
Chapter 27. Behavioural Science in Cyber Security - Leron Zinatullin
Chapter 28. Agile Cyber Security Process Capability - Lanre Rotimi
Chapter 29. Cyber Secret, Life Secrets – On the Verge of Human Science - Arthue Keleti
Chapter 30. A Plan for the SME - William McBorrough
Chapter 31. Conclusion - Helen Wong MBE

Appendix 1 Theresa May Speech, Munich Security Conference, February 2018
Appendix 2 Cyber-Security Lexicon for Converged Systems
Appendix 3 The Government's National Response
Appendix 4 Sample Legal Documents

Product details

Published 28 Sep 2018
Format Ebook (Epub & Mobi)
Edition 1st
Extent 352
ISBN 9781526505873
Imprint Bloomsbury Professional
Publisher Bloomsbury Publishing

About the contributors


Helen Wong MBE

Helen Wong MBE is a senior consultant and advises…


Bloomsbury Collections

This book is available on Bloomsbury Collections where your library has access.

Related Titles