You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Web-based connections permeate our lives - and so do data breaches. Given that we must be online for basic communication, finance, healthcare, and more, it is remarkable how many problems there are with cybersecurity. Despite the passage of many data security laws, data breaches are increasingat a record pace. In Breached!, Daniel Solove and Woodrow Hartzog, two of the world's leading experts on cybersecurity and privacy issues, argue that the law fails because, ironically, it focuses too much on the breach itself.Drawing insights from many fascinating stories about data breaches, Solove and Hartzog show how major breaches could have been prevented through inexpensive, non-cumbersome means. ...
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.
Elvy explores the consumer ramifications of the Internet of Things through the lens of the commercial law of privacy and security.
A clear, comprehensive, and cutting-edge introduction to the field of information privacy law, with the latest cases and materials exploring issues of emerging technology, information privacy, algorithmic decisions, AI, data security, and European data protection law. New to the 8th Edition: Tighter editing and shorter chapters New sections about AI and algorithms in law enforcement (Chapter 4), consumer privacy (Chapter 9), and employment privacy (Chapter 12) New cases: MD Anderson, Loomis v. Wisconsin, Clearview AI Discussion of post-Carpenter cases Discussion of new FTC enforcement cases involving dark patterns and algorithm deletion Discussion of protections of reproductive health data after Dobbs Benefits for instructors and students: Extensive coverage of FTC privacy enforcement, HIPAA and HHS enforcement, and standing in privacy lawsuits, among other topics Chapters devoted exclusively to data security, national security, employment privacy, and education privacy Sections on government surveillance and freedom to explore ideas Engaging approach to complicated laws and regulations such as HIPAA, FCRA, ECPA, GDPR, and CCPA
data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen – utilizing the full potential of what ICT-technology has to offer – seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on oneâ€...
The author explains why wrap contracts were created, how they have developed, and what this means for society. The book uses hypotheticals, cases, and real world examples. She discusses court decisions and provides summary critiques to go with these. In addition, she provides doctrinal solutions grounded in law and policy. The book defines and distinguishes different types of contract terms. Finally, it includes actual wrap contract terms, flow charts, checklists, and other visual aids to explain legal concepts.
In contemporary societies children's racial identity is co-constructed in response to racial stereotyping with extended family, peers and teachers, and potent media sources. The studies in this volume take cognizance of earlier research into skin colour and racial stereotyping, but advance its contemporary implications.
A clear, comprehensive, and cutting-edge introduction to the field of information privacy law with a focus on the crucial topic of the protection of consumer interests. This volume is perfect for a full three-credit course or a seminar. Read the latest cases and materials exploring issues of emerging technology, information privacy, financial data, consumer data, and data security. New to the 4th Edition: Tighter editing and shorter chapters New case on facial recognition and the BIPA: Clearview AI Discussion of new FTC enforcement cases involving dark patterns and algorithm deletion Discussion of protections of reproductive health data after Dobbs New section on AI and algorithms New case on standing: TransUnion v. Ramirez New material about state consumer privacy laws
In recent years the field of bioinformatics has emerged from the university research laboratory and entered the mainstream healthcare establishment. During this time there has been a rapid increase of legal developments affecting this dynamic field, from Supreme Court decisions radically altering the patentability of informatics inventions to major developments in privacy law both in Europe and the U.S. This edited book strives to offer the reader insight into some of the major legal trends and considerations applicable to these fields today.