Show Summary Details

C

Cyber Security: Law and Guidance

Author:
Helen Wong
Publisher:
Bloomsbury Professional
Edition:
Second edition
Publication Date:
2025
C C-Suite cyber risk accountability 8.06 — 8.10 budgets 8.11 — 8.16 management of strategy 8.17 — 8.18 summary 8.19 — 8.23 C2M2 program electric utilities, and 10.144 — 10.151 energy sector, and 10.303 C3DP generally 12.54 CPUs critical flaws, and 29.46 — 29.49 Change management built environment, and 6.26 Charter of Fundamental Rights and Freedoms generally 3.19 — 3.21 ChatGPT privacy 29.93 privacy, and 29.18 China Data Security Law 22.73 surveillance, and 29.56 — 29.60 Civil liability for data breach breach of confidence 18.36 — 18.39 contractual claims 18.43 — 18.44 follow-on claims 18.26 — 18.33 GDPR 18.18 — 18.20 generally 18.16 — 18.17 misuse of private information 18.40 — 18.42 NIS Directive 18.46 — 18.47 notification of breach 18.34 — 18.35 regulatory action 18.21 — 18.25 tortious claims 18.45 Classification of data assumptions 17.13 benefits 17.07 — 17.11 business impact analysis, and implementation of resource allocation 17.27 integration ...

If you would like to access this content, but you are not currently a subscriber, please sign up for a free trial here. If you already subscribe to this service please login here.