The Data Privacy Guidance You Need from One of the World's Top Experts!

Privacy and Data Security Law Deskbook

Privacy and Data Security Law Deskbook by Lisa J. Sotto
Privacy and Data Security Law Deskbook provides the thorough, practical, sector-specific guidance that helps you meet today's challenges and minimize the risk of data breaches that can damage a company's reputation. Read more >

Share this product:

Format:
  • Author(s): Lisa J. Sotto
  • Media: Looseleaf
  • Pages: 1404
  • Supplement Date: 10/08/2012
  • Publication Frequency: Supplemented annually
  • Offer Number/PIN: 0735591105
  • ISBN: 9780735591103
  • ETA: Available: Item ships in 3-5 Business Days
  • Product Line: Aspen Publishers
Priority Code
Apply

Got Questions? Chat with Us 
Mon - Fri from 9:00 am - 4:30 pm ET.

 
 

An essential compliance tool for every privacy officer and attorney involved in managing privacy and data security issues, Privacy and Data Security Law Deskbook provides the thorough, practical, sector-specific guidance that helps you meet today's challenges and minimize the risk of data breaches that can damage a company's reputation.

Privacy and Data Security Law Deskbook enables you to comply with data privacy laws relating to:

  • Marketing efforts - including standards governing online behavioral advertising and targeted marketing
  • Privacy in the workplace - such as standards governing employee monitoring and background screening of employees and applicant
  • Health information - focusing on the Health Insurance Portability and Accountability Act (HIPAA), with insight into the HITECH Act's impact on data breaches and other recent changes
  • Financial privacy - including the Gramm-Leach-Bliley Act's regulations for the collection and disclosure of personal information in the banking and insurance industries
  • Consumer reports - with detailed coverage of the Fair Credit Reporting Act and Fair and Accurate Credit Transactions Act
  • Government surveillance - including the latest developments in warrantless wiretapping
  • Social networking - including the FTC's current approach

Privacy and Data Security Law Deskbook is written by Lisa J. Sotto - one of the world's foremost legal practitioners in the field. Ms. Sotto is partner and head of Hunton & Williams' Privacy and Information Management practice, which was ranked in "Band 1” for Privacy and Data Security by both the Chambers USA and Chambers Global guides. READ MORE!

Packed with sample documents, checklists, and other compliance-enabling tools, Privacy and Data Security Law Deskbook allows you to:

  • Navigate the various breach notification requirements in the more than 45 states that have such laws in place
  • Comply with global data protection laws (including those in the EU), facilitating compliance with cross-border data transfer restrictions
  • Keep current with emerging legal trends, from changes in federal and state laws to the latest data privacy regulations abroad

Privacy and Data Security Law Deskbook has been updated to include:

  • Discussion on the transfer of rulemaking and enforcement authority from the financial regulatory agencies to the new Consumer Financial Protection Bureau
  • Analysis of the SEC's Disclosure Guidance regarding cybersecurity risks and cyber incidents
  • Analysis of proposed changes to the accounting of disclosure requirements in the HIPAA Privacy Rule
  • Overview of OCR's new program to audit covered entities and business associates
  • Updated information on the protection of social media communications by the National Labor Relations Board
  • Updates on recent Federal Trade Commission enforcement actions related to Facebook and Google
  • Recent memoranda issued by the National Labor Relations Board addressing workplace privacy complaints
  • And much more!

For more information on privacy and data security law issues, read Hunton & Williams' Privacy and Information Security Law Blog!

  • OVERVIEW OF GLOBAL PRIVACY REGIMES
    • United States Privacy Framework
    • European Union Privacy Framework
    • "Habeas Data" in Latin America
    • Global Harmonization of Data Protection Principles
    • Conclusion
  • FAIR CREDIT REPORTING ACT AND FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003
    • Introduction
    • Fair Credit Reporting Act
    • Fair and Accurate Credit Transactions Act of 2003
  • FINANCIAL PRIVACY
    • In General
    • Gramm-Leach-Bliley Act
    • State Financial Privacy Laws
    • Right to Financial Privacy Act of 1978
  • PRIVACY OF HEALTH INFORMATION
    • In General
    • Health Insurance Portability and Accountability Act of 1996
    • Genetic Information Nondiscrimination Act of 2008
    • State Laws
  • CHILDREN'S AND STUDENTS’ PRIVACY
    • Introduction
    • Children's Online Privacy Protection Act
    • Children's Advertising Review Unit Guidelines
    • State Child Privacy Protection Laws
    • Family Educational Rights and Privacy Act of 1974
  • TELECOMMUNICATIONS PRIVACY
    • In General
    • Telecommunications Act of 1996
    • Telephone Records and Privacy Protection Act
  • DRIVER'S PRIVACY PROTECTION ACT
    • Background
    • Prohibitions and Exceptions
    • Resale and Redisclosure of Personal Information
    • Civil and Criminal Liability
    • State Statutes
    • Case Law
  • PRIVACY OF VIDEO RECORDS
    • Overview
    • Limitations on Disclosure
    • Destruction of Personally Identifiable Information
    • Competing Views on Applicability of the Law
    • Penalties
    • Relationship of Federal Law to State Law
  • MARKETING AND PRIVACY
    • In General
    • Direct Postal Mail Marketing
    • E-Mail Marketing
    • Telemarketing
    • Mobile Marketing: SMS and MSCM
    • Facsimile Advertising
    • California's "Shine the Light" Law
    • California's Song-Beverly Credit Card Act of 1971 and Other State Analogs
    • Behavioral Advertising
    • Privacy Seal Programs
  • WORKPLACE PRIVACY
    • In General
    • Labor and Employment Laws
    • Background Screening of Employees and Applicants
    • Disposal of Employee Personal Information
    • Protection of Social Security Numbers
    • Health Information
    • Workplace Monitoring
    • Privacy Torts
    • Conclusion
  • PRIVACY POLICIES
    • Introduction
    • Federal Requirements
    • State Law
    • FTC Enforcement Actions
    • Case Law
    • Conclusion
  • SOCIAL NETWORKING
    • In General
    • Private Controversies in Social Networking
    • Data Ownership
    • Financial Industry Guidance
    • Cyberbullying and Internet Impersonation
    • Social Networking Safety
    • Future of Social Networking
  • SURVEILLANCE
    • Background
    • Electronic Communications Privacy Act of 1986
    • Computer Fraud and Abuse Act
    • Foreign Intelligence Surveillance Act
    • State Surveillance Laws
  • INFORMATION SECURITY
    • In General
    • Applicable Law
  • INFORMATION SECURITY BREACH NOTIFICATION LAWS
    • Introduction
    • State Security Breach Notification Requirements
    • Federal Breach Notification Requirements
    • How to Respond to a Security Breach
  • FTC AND STATE ENFORCEMENT
    • Section 5 of the Federal Trade Commission Act
    • Enforcement Under State "Little FTC Acts"
  • PRIVACY TORTS
    • Introduction
    • Intrusion upon Seclusion
    • Appropriation of Name or Likeness
    • Public Disclosure of Private Facts
    • False Light
  • EUROPEAN UNION DATA PROTECTION LAW
    • Background
    • EU Data Protection Framework
  • OTHER GLOBAL PRIVACY LAWS
    • In General
    • Argentina
    • Australia
    • Canada
    • China
    • Dubai International Financial Centre
    • Hong Kong
    • Israel
    • Japan
    • New Zealand
    • Russia
    • South Korea
  • APPENDICES (also included on the companion CD-ROM)
    • Selected Security Breach Notification Laws
    • Selected State Data Security Laws
    • Selected State Records Disposal Laws
    • Selected State Social Security Number Protection Laws
    • Selected State Anti-Spyware Laws
    • Selected State Do-Not-Fax Laws
    • Selected State Telephone-Monitoring Laws
    • Federal Trade Commission: Selected Section 5 Enforcement Actions
    • GLB Model Privacy Notice Forms:
    • Model Privacy Form - Opt Out;
    • Model Privacy Form - No Opt Out
    • HIPAA Sample Business Associate Contract Provisions (HHS Model)
    • EU Model Contracts
    • Safe Harbor Privacy Principles and Frequently Asked Questions
    • Binding Corporate Rules: Official Documents
    • Article 17 Model Contract
    • APEC Privacy Framework

No Image
Lisa J. Sotto
View Highlight