Information Security Law: The Emerging Standard for Corporate Compliance
()
About this ebook
Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide.
Thomas Smedinghoff
Thomas J. Smedinghoff is a partner in the Privacy, Data Security, and Information Law Practice at the law firm of Wildman, Harrold, Allen & Dixon LLP in Chicago. His practice focuses on the developing field of information law and electronic business activities, with an emphasis on information security and privacy issues, electronic transactions, and the corporate use and management of information generally. Mr Smedinghoff has been actively involved in developing e-business and information security legal policy, both in the US and globally. He currently serves as a member of the US Delegation to the United Nations Commission on International Trade Law (UNCITRAL) Working Group on Electronic Commerce, where he participated in negotiation of the 2005 United Nations Convention on the Use of Electronic Communications in International Contracts. He chaired the Illinois Commission on Electronic Commerce and Crime (1996-1998) that wrote the Illinois Electronic Commerce Security Act. He also served as an American Bar Association advisor to the Uniform Law Commission, where he participated in drafting the Uniform Electronic Transactions Act (UETA) now enacted in 46 of the 50 states in the US. Mr Smedinghoff currently chairs the International Policy Coordinating Committee of the American Bar Association (ABA) Section of Science & Technology Law. Previously, he was chair of the ABA Section of Science & Technology Law (1999-2000) and chair of the ABA Electronic Commerce Division (1995-2003). He is also the editor and primary author of the e-commerce book titled Online Law: The Legal Guide to Doing Business on the Internet (1996).
Related to Information Security Law
Related ebooks
Data Protection Officer Rating: 0 out of 5 stars0 ratingsThe California Consumer Privacy Act (CCPA): An implementation guide Rating: 4 out of 5 stars4/5Information Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsData Protection and Compliance: Second edition Rating: 0 out of 5 stars0 ratingsIT Governance Critical Issues Series: Cyber Security Rating: 0 out of 5 stars0 ratingsCyber Risks for Business Professionals: A Management Guide Rating: 0 out of 5 stars0 ratingsA Practical Guide to IT Law Rating: 0 out of 5 stars0 ratingsCybersecurity Law, Standards and Regulations, 2nd Edition Rating: 0 out of 5 stars0 ratingsGDPR-standard data protection staff training: What employees & associates need to know by Dr Paweł Mielniczek Rating: 0 out of 5 stars0 ratingsManaging Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsEmployment Practices Liability: Guide to Risk Exposures and Coverage, 2nd Edition Rating: 0 out of 5 stars0 ratingsIT Outsourcing Contracts: A Legal and Practical Guide Rating: 3 out of 5 stars3/5GDPR Compliance A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsEvaluation Fraud A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSaaS Subscription Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsPrivacy Policies A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsProtecting Your Company's Intellectual Property: A Practical Guide to Trademarks, Copyrights, Patents and Trade Secrets Rating: 0 out of 5 stars0 ratingsManaging Fraud Risk: A Practical Guide for Directors and Managers Rating: 0 out of 5 stars0 ratingsCyber Law: A Legal Arsenal for Online Business Rating: 0 out of 5 stars0 ratingsThe California Privacy Rights Act (CPRA) – An implementation and compliance guide Rating: 0 out of 5 stars0 ratingsThe Corporate Contract in Changing Times: Is the Law Keeping Up? Rating: 0 out of 5 stars0 ratingsCriminal Capital: How the Finance Industry Facilitates Crime Rating: 0 out of 5 stars0 ratingsEssentials of Sarbanes-Oxley Rating: 0 out of 5 stars0 ratingsIdentity Crisis: How Identification is Overused and Misunderstood Rating: 0 out of 5 stars0 ratingsJudging Policy: Courts and Policy Reform in Democratic Brazil Rating: 0 out of 5 stars0 ratingsJustice and Public Administration Rating: 0 out of 5 stars0 ratingsAn Executive Guide CCPA: The Why, When, Where, What , and Who Guide to the California Consumer Privacy Act -2018 Rating: 0 out of 5 stars0 ratingsThe 7 Deadly Sins of Market Abuse Rating: 0 out of 5 stars0 ratingsFedRAMP Compliance A Clear and Concise Reference Rating: 0 out of 5 stars0 ratings
Computer & Internet Law For You
The Dark Web: The Unseen Side of the Internet Rating: 0 out of 5 stars0 ratingsiOS Programming: Starter Guide: What Every Programmer Needs to Know About iOS Programming Rating: 2 out of 5 stars2/5The Twenty-Six Words That Created the Internet Rating: 4 out of 5 stars4/5Delete: The Virtue of Forgetting in the Digital Age Rating: 4 out of 5 stars4/5ISO/IEC 27701:2019: An introduction to privacy information management Rating: 4 out of 5 stars4/5Token Economy: How the Web3 reinvents the Internet Rating: 4 out of 5 stars4/5IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition Rating: 5 out of 5 stars5/5Mastering ChatGPT: Business Uses: Podcasts in Print Rating: 2 out of 5 stars2/5Cybersecurity Essentials: The Beginner's Guide Rating: 5 out of 5 stars5/5Summary of Ready Player One: By Ernest Cline Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Hack: Making Money Online has never been this EASY Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsThe United States of Anonymous: How the First Amendment Shaped Online Speech Rating: 4 out of 5 stars4/5EU GDPR – An international guide to compliance Rating: 0 out of 5 stars0 ratingsThe Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks Rating: 0 out of 5 stars0 ratingsExposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 0 out of 5 stars0 ratingsLegal Guide to Social Media, Second Edition: Rights and Risks for Businesses, Entrepreneurs, and Influencers Rating: 5 out of 5 stars5/5Freedom of expression and the internet: Updated and revised 2nd edition Rating: 0 out of 5 stars0 ratingsHarvard Law Review: Volume 127, Number 3 - January 2014 Rating: 0 out of 5 stars0 ratingsRutgers Computer & Technology Law Journal: Volume 41, Number 1 - 2015 Rating: 0 out of 5 stars0 ratingsIndustry of Anonymity: Inside the Business of Cybercrime Rating: 2 out of 5 stars2/5Quick Win Media Law Ireland: Answers to your top 100 Media Law questions Rating: 0 out of 5 stars0 ratingsEU GDPR - A pocket guide, second edition Rating: 0 out of 5 stars0 ratingsThe Ultimate GDPR Practitioner Guide: Demystifying Privacy & Data Protection Rating: 0 out of 5 stars0 ratingsWebsite Law: The Legal Guide for Website Owners and Bloggers Rating: 5 out of 5 stars5/5A Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR), third edition: An Implementation and Compliance Guide Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition Rating: 0 out of 5 stars0 ratingsInternet Governance: The NETmundial Roadmap Rating: 0 out of 5 stars0 ratings
Reviews for Information Security Law
0 ratings0 reviews