Business Law Monographs, Volume C10- Cyber Security and Corporate Liability

Business Law Monographs, Cyber Security and Corporate Liability covers the complex and emerging law of the electronic business environment.

Select a format

Print Book
ISBN: 9780820550664
In Stock
Price
$803.00
QTY
eBook:epub
ISBN: 9780327172543
In Stock
Price
$686.00
Best value
QTY
International Order Inquiry

Product description

Business Law Monographs, Cyber Security and Corporate Liability covers the complex and emerging law of the electronic business environment. Cyber security and corporate liability law and policy can be defined as a range of laws and policies that address the confidentiality of information and data, protect the operations of cyber systems. Business Law Monographs, Cyber Security and Corporate Liability shows counsel how to help corporate clients manage risk and liability inherent in Information Age technologies and business practices. The material provides strategies for managing malicious information security breaches as well as inadvertent information infrastructure failures. Discussion in Business Law Monographs, Cyber Security and Corporate Liability is broken down into two main areas: security and liability issues.

Security issues:

Chapter 1 identifies relevant legal issues connected with cyber security and corporate liability planning and the significant role of corporate counsel in developing legal strategies to manage cyber security risks and liabilities. Given the open and unsecured nature of computer and information technologies and the immense pressures to deliver services and products to market, there is no possible way that corporate managers can fully secure all assets or completely eliminate liability.

Chapter 4 addresses challenges for counsel, corporate considerations, and builds a foundation for exploring appropriate structures and frameworks to manage legal risks in the Information Age. Cyber security and corporate liability requires companies to piece together philosophies on solid and well-positioned corporate governance frameworks. As with discussions on liability and board of director responsibilities, this chapter focuses on the specific framework that counsel must outline, support, stitch together, and implement to manage complex cyber risks in a legal environment.

Chapter 7 focuses on commercial challenges facing counsel in the context of criminal liability for cyber security and corporate liability planning. In this light, counsel's preparations should include a thorough due diligence review of relevant criminal laws. This assessment may require a careful analysis of laws covering cyber intrusions, computer-related espionage and trade secret theft, and other federal and state laws impacting corporate cyber activity.

Chapter 8 reviews the legal and policy foundation for two significant federal government security challenges: 1) Homeland Security, National Security, Intelligence and Critical Infrastructure Protection; and 2) and Electronic Government.

Liability Issues:

Chapter 2 looks at general liability. Given the realities of the cyber world, traditional risk management tools are not generally constituted to prevent or mitigate damages. This chapter discusses new risk management processes corporate counsel may need to consider, focusing on the relationships between traditional principals of due diligence and corporate responsibility with the management of cyber-security risks in the second decade of the 21st century.

Chapter 3 looks at emerging liability issues and areas of legal concern that counsel might identify and find ways to overcome as they manage the complex risks that can lead to harm for their clients.

Chapter 5 focuses on comprehensive and enterprise-wide programs and policies for responding to cyber security and corporate liability incidents and outages with suggestions that counsel should require and monitor the development and implementation of response and mitigation practices for an array of activities.

Chapter 6 discusses steps counsel should incorporate in their cyber security and corporate liability principles in the development, maintenance, and review of the enterprise's insurance program.

The forms and source materials included in this Monograph, as well as the other resources discussed and referred to, provide corporate counsel with a wide range of materials relating to cyber security and corporate liability. All of these forms and resources were produced by professionals in a variety of industries, such as insurance and financial services; in some cases, legislative materials and forms from government and law enforcement provide a different perspective. Overall, the resources and documents discussed, reproduced and/or referenced, offer counsel the types of guidance and insights necessary to understand the many aspects of cyber security and corporate liability.

Also available as part of the complete 38-volume set entitled Business Law Monographs.

eBooks, CDs, downloadable content, and software purchases are noncancelable, nonrefundable and nonreturnable. Click here for more information about LexisNexis eBooks. The eBook versions of this title may feature links to Lexis+® for further legal research options. A valid subscription to Lexis+® is required to access this content.

 

Table of contents

Division I TEXT

CHAPTER 1 Introduction to Developing Legal Strategies to Manage Cyber Security Risks and Liabilities.

CHAPTER 2 Liability

CHAPTER 3 Emerging Liability Issues

CHAPTER 4 Developing a Security Program.

CHAPTER 5 Response and Mitigation

CHAPTER 6 Prevention

CHAPTER 7 Law Enforcement

CHAPTER 8 Federal Government: Homeland Security, Critical Infrastructure Protection, & Electronic Government

Division II FORMS

Form 1 Sample Internet Insurance Policy


Form C10-2 OCC Bulletin -- Technology Risk Management: PC Banking


Form C10-3 OCC Bulletin -- Infrastructure Threats: Intrusion Risks


Form C10-4 OCC Bulletin -- Electronic Banking


Form C10-5 The Financial Services Information Sharing & Analysis Center


Form C10-6 National Infrastructure Protection Center Cyber Threat and Computer Intrusion Incident Reporting Guidelines


Form C10-7 Ethical Hacking Best Practices by Ken Brandt


Form C10-8 Office of Thrift Supervision, Department of the Treasury, New Suspicious Activity Form


Form C10-9 Office of Thrift Supervision, Department of the Treasury, Privacy Preparedness Check-up


Form C10-10 Office of Thrift Supervision, Department of the Treasury, Risk Management of Technology Outsourcing


Form C10-11 CEO Guide to Security Challenges

Division III SOURCE MATERIALS


Item C10-1 Executive Order 13228: Establishing the Office of Homeland Security and the Homeland Security Council


Item C10-2 Executive Order 13231: Critical Infrastructure Protection in the Information Age