Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management, 2nd Edition
This comprehensive handbook brings together expertise from industry leaders and outlines best practices for network security, asset management, assessing threats and vulnerabilities, amongst other areas of cyber protection.
One Year Subscription Only Terms
Subscribers receive the product(s) listed on the Order Form and any Updates made available during the annual subscription period. Shipping and handling fees are not included in the annual price.
Subscribers are advised of the number of Updates that were made to the particular publication the prior year. The number of Updates may vary due to developments in the law and other publishing issues, but subscribers may use this as a rough estimate of future shipments. Subscribers may call Customer Support at 800-833-9844 for additional information.
Subscribers may cancel this subscription by: calling Customer Support at 800-833-9844; emailing customer.support@lexisnexis.com; or returning the invoice marked 'CANCEL'.
If subscribers cancel within 30 days after the product is ordered or received and return the product at their expense, then they will receive a full credit of the price for the annual subscription.
If subscribers cancel between 31 and 60 days after the invoice date and return the product at their expense, then they will receive a 5/6th credit of the price for the annual subscription. No credit will be given for cancellations more than 60 days after the invoice date. To receive any credit, subscriber must return all product(s) shipped during the year at their expense within the applicable cancellation period listed above.
Product description
This book is a resource for legal professionals, primarily in-house lawyers, but also lawyers who regularly advise on data protection, privacy, cybersecurity and related areas of law. It provides commentary and analysis of the current state of the law, the legislative landscape, and methods of prevention and management of a cyberattack. The new edition will provide a discussion and analysis of the background and foundation of the law as well as practical best practice guidance. It will also include key legislative updates to the Personal Information Protection and Electronics Documents Act (PIPEDA), which is the law relating to data privacy.
Features & Benefits
- Updated privacy law (recent major changes to PIPEDA)
- Contributions by the Royal Canadian Mounted Police (RCMP) and Canadian Security Intelligence Service is Canada (CSIS)
- Provides best practices to employ in prevention and management of cyberattacks.
What's New in This Edition
- Updated case law and legislation
- Contributions by the RCMP and CSIS to the following chapters and topics:
- Cybersecurity due diligence in M&A transactions
- Cyber incident management for cyber insurance claims
- The role of legal privilege in cyber incident response
- Cybersecurity, data breach and privacy class actions in Canada
- Criminal Code enforcement action in Canada
- How to run an incident response investigation
Table of contents
Introduction
Chapter 1: Overview of the Canadian cybersecurity landscape
Chapter 2: Best practices to implement prior to a breach
Chapter 3: Cloud computing
Chapter 4: Procurement considerations for Cybersecurity
Chapter 5: Supply chain cybersecurity
Chapter 6: Cybersecurity considerations for business transactions
Chapter 7: Oversight obligations of the board of directors and management
Chapter 8: Incident management
Chapter 9: You’ve been breached!: technical considerations for incident management
Chapter 10: Reporting and notification requirements under privacy laws
Chapter 11: Reporting and notification requirements under other regulatory authorities
Chapter 12: Public sector cybersecurity
Chapter 13: Cross border considerations for managing a cybersecurity incident
Chapter 14: Reporting to and working with law enforcement
Chapter 15: Legal privilege during breach response
Chapter 16: Litigation exposure
Chapter 17: Cyber and privacy insurance
Chapter 18: Credit monitoring
Chapter 19: Communications best practices for cyber incidents