• Skip to main content
  • Skip to primary sidebar

Information Security Management ResourceKit

A Public Service of SecureTheVillage

  • Home
  • Return to SecureTheVillage

Basic Cyber Laws

 

External Resources

Data Breach Laws

http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx Security Breach Notification Laws – National Conference of … www.ncsl.org

A majority of states have enacted security breach laws, requiring disclosure to consumers when personal information is compromised, among other requirements.

Computer Crime Laws and Statistics

http://www.ncsl.org/research/telecommunications-and-information-technology/computer-hacking-and-unauthorized-access-laws.aspx

http://www.ncsl.org

Computer crime laws encompass a variety of actions that destroy or interfere with normal operation of a computer system. Hacking is breaking into computer systems …https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ccmanual.pdf

 

 

 

Privacy

Privacy Laws | State of California – Department of Justice:   https://oag.ca.gov/privacy/privacy-laws

Making your Privacy Practices Public. Kamala D. Harris, Attorney General California Department of Justice:  https://oag.ca.gov/sites/all/files/agweb/pdfs/cybersecurity/making_your_privacy_practices_public.pdf

PRIVACY ON THE GO. RECOMMENDATIONS FOR THE MOBILE ECOSYSTEM January 2013. Kamala D. Harris, Attorney General California Department of Justice: https://oag.ca.gov/sites/all/files/agweb/pdfs/privacy/privacy_on_the_go.pdf

 

SecureTheVillage Webinar: Basics of Cyber-Law

Webinar: Basics of Cyber-Law

Webinar Deck (PDF): Basics of Cyber-Law

May 3, 2018: Stan’s Guests:
Bennet Kelley, Internet Law Center, Cyberlaw and Business Report
Tom Peistrup, General Counsel, InStyler/Tre Milano
Tim Toohey, Partner, Greenberg Glusker Fields Claman & Machtinger
Michael Zweiback, Partner, Zweiback, Fiset & Coleman

 

 

Primary Sidebar

Resources Areas

  • Cyber Threats
    • Ransomware
    • Online Bank Fraud
  • Information Security Management / Leadership
  • Information Security Policies and Standards
  • Information Security Risk Assessment
  • Information Classification and Control
  • Securing the Human
  • Third-Party Security Management
  • Managing Security of the IT Infrastructure
  • Legal & Related
    • Basic Cyber Laws
    • Payment Card Industry Data Security Standard (PCI DSS)
    • General Data Protection Regulation (GDPR)
    • California Consumer Privacy Act (CCPA)
    • Cybersecurity Maturity Model Certification (CMMC)
  • Getting Cyber-Prepared: Incident Response & Business Continuity
  • Managing Cyber-Risk and Insurance
  • Personal Cybersecurity
  • Cyber Freedom

Copyright © 2023 · SecureTheVillage