Livraison rapide
Paiement sécurisé
Retours gratuits

Cybersecurity in Canada: A Guide to Best Practices, Planning, and Management, 2nd Edition

This comprehensive handbook brings together expertise from industry leaders and outlines best practices for network security, asset management, assessing threats and vulnerabilities, amongst other areas of cyber protection.

Langue De Publication: English
Book
150,00 $
Quantité

Softcover | 248 pages

En stock
Publié: 11 mars 2021
ISBN/ISSN: 9780433499084

Détails des produits

This book is a resource for legal professionals, primarily in-house lawyers, but also lawyers who regularly advise on data protection, privacy, cybersecurity and related areas of law. It provides commentary and analysis of the current state of the law, the legislative landscape, and methods of prevention and management of a cyberattack. The new edition will provide a discussion and analysis of the background and foundation of the law as well as practical best practice guidance. It will also include key legislative updates to the Personal Information Protection and Electronics Documents Act (PIPEDA), which is the law relating to data privacy.

Features & Benefits

  • Updated privacy law (recent major changes to PIPEDA)
  • Contributions by the Royal Canadian Mounted Police (RCMP) and Canadian Security Intelligence Service is Canada (CSIS)
  • Provides best practices to employ in prevention and management of cyberattacks.

What's New in This Edition

  • Updated case law and legislation
  • Contributions by the RCMP and CSIS to the following chapters and topics:
    • Cybersecurity due diligence in M&A transactions
    • Cyber incident management for cyber insurance claims
    • The role of legal privilege in cyber incident response
    • Cybersecurity, data breach and privacy class actions in Canada
    • Criminal Code enforcement action in Canada
    • How to run an incident response investigation
 

Auteurs à la une

Table des matières

Introduction 
Chapter 1: Overview of the Canadian cybersecurity landscape
Chapter 2: Best practices to implement prior to a breach
Chapter 3: Cloud computing
Chapter 4: Procurement considerations for Cybersecurity
Chapter 5: Supply chain cybersecurity
Chapter 6: Cybersecurity considerations for business transactions
Chapter 7: Oversight obligations of the board of directors and management
Chapter 8: Incident management
Chapter 9: You’ve been breached!: technical considerations for incident management
Chapter 10: Reporting and notification requirements under privacy laws
Chapter 11: Reporting and notification requirements under other regulatory authorities
Chapter 12: Public sector cybersecurity
Chapter 13: Cross border considerations for managing a cybersecurity incident
Chapter 14: Reporting to and working with law enforcement
Chapter 15: Legal privilege during breach response
Chapter 16: Litigation exposure
Chapter 17: Cyber and privacy insurance
Chapter 18: Credit monitoring
Chapter 19: Communications best practices for cyber incidents