%{search_type} search results

39 catalog results

RSS feed for this result
Book
xxiv, 392 pages : illustrations, forms ; 26 cm
  • Foreword
  • The need for cybersecurity
  • The black market for your data : the cybercrime economy
  • Advertising : another market for your data
  • Basic information security principles
  • Basic computer principles
  • Basic networking and the Internet
  • Start securing yourself
  • Secure your devices
  • Secure your data
  • Secure your network and Internet use
  • Secure your family, children, and seniors
  • Secure yourself when you travel
  • Secure the work office
  • The law, and the role and responsibilities of lawyers
  • Troubleshooting and responding to your own incidents
  • Conclusion.
"[This book] helps individuals take control of their cybersecurity. Every day in the news, we see cybercrime — a multi-billion-dollar-a-year criminal industry whose actors have little fear of law enforcement. Incidents of cybercrime and cybercrime-related identity theft continue to grow exponentially. As a result, governments, regulators, and professional bodies increasingly require that lawyers and other professionals take reasonable cybersecurity measures. Beyond protecting workplaces from cybertheft or intrusion, there's also a need to protect ourselves and our families from these threats."-- Provided by publisher.
Law Library (Crown)
Book
ix, 459 pages ; 26 cm
  • Principles
  • Practices
  • Appendix A. U.S. government information-sharing agreements involving personal information
  • Appendix B. Domestic and International principles.
Law Library (Crown)
Book
xii, 155 pages ; 26 cm
  • Regulation of preclinical research / Daniel T. Pancamo
  • Federal regulation of clinical research / Erika Lietzan and Afia Asamoah
  • Approval of biotechnology products for human use / Areta Kupchyk
  • Federal and state regulation after approval / Areta Kupchyk.
Law Library (Crown)
Book
xi, 137 pages ; 28 cm
  • Overview
  • Methodology
  • Findings
  • Botnet research legal template.
Law Library (Crown)
Book
x, 155 pages : illustrations, forms ; 28 cm
  • Introduction to the legal guide
  • Legal analysis tool on obtaining & using network communications data
  • Privacy analysis tool on using network communications data
  • Protection measures tool.
Law Library (Crown)
Book
xiv, 144 pages ; 23 cm
  • Introduction
  • The impact of consumerization of information technology
  • Managing a mobile device program
  • Discovery and records management issues
  • Information security issues
  • Privacy issues
  • Protecting trade secrets and confidential information
  • Insurance issues
  • Employment law issues
  • Future challenges.
As workers use smart phones, tablets, and laptops for both their work and their personal lives, chief information officers face the complex challenges of managing mobile devices in the business setting. This book examines key concepts, considerations, and issues in mobile device management-from business, legal, and technical perspectives, with background information on business drivers and technology. A sample motion device policy is included as a starting point for a business' mobile device program documentation. Because the guide is written for a wide audience, it will serve as a helpful reference for business and technology professionals as well as attorneys.
(source: Nielsen Book Data)9781627221832 20160612
Law Library (Crown)
Book
xxi, 163 p. : forms ; 28 cm. + 1 CD-ROM.
  • E-commerce checklists
  • Privacy checklists
  • Software checklists
  • Business/miscellaneous checklists.
Law Library (Crown)

8. The scitech lawyer [2004 - ]

Journal/Periodical
volumes : illustrations (some color) ; 28 cm

9. The scitech lawyer [2004 - ]

Journal/Periodical
v. : ill. ; 28 cm.
HeinOnline For assistance ask at the Stanford Law Library reference desk.
Law Library (Crown)
Book
x, 137 p. ; 23 cm.
Law Library (Crown)
Book
xix, 528 pages ; 23 cm
  • Background and history of HIPAA, HITECH, and beyond
  • HIPAA/HITECH privacy and security
  • Scope and applicability of the HIPAA security rule
  • The security rule
  • The breach notification rule and handling breaches
  • Compliance and enforcement
  • Litigation and risk management
  • Emerging technologies.
"HIPAA and the Security Rule are sources of law, but the Security Rule also acts as a source of information security practices. [This book] bridges the gap between the law and information security practices. Unlike other books on HIPAA, the focus of this book is the HIPAA Security Rule, as modified by the HITECH Act and the HIPAA Final Omnibus Rule. This publication discusses the Security Rule's role in the broader context of HIPAA, the HITECH Act, and their regulations. At the heart of this publication is a detailed section-by-section analysis of each provision in the Security Rule covering a security safeguard. This analysis explains the security topic and what organizations can do to comply."-- Back cover.
Law Library (Crown)
Book
xxii, 344 pages : illustrations ; 25 cm
  • Section 1: Introduction to unmanned aircraft technology and law: Introduction to unmanned aircraft law / Donna A. Dulo
  • A brief history of unmanned aircraft / Jonathan B. Rupprecht and Donna A. Dulo
  • Aeronautical foundations of the unmanned aircraft / Donna A. Dulo
  • Section 2: FAA rulemaing and unmanned aircraft law: The federal aviation administration rulemaking process / Jonathan B. Rupprecht
  • Unmanned aircraft in the national airspace / Cameron R. Cloar
  • Grounded in the law / Timothy M. Ravich
  • Considerations of a legal framework for the safe and resilient operation of civilian autonomous unmanned aircraft / Donna A. Dulo and Cameron R. Cloar
  • Section 3: Unmanned aircraft safety, security, and information assurance regulation and technology in the national critical infrastructure: Information assurance, cybersecurity, and legislation relating to unmanned aircraft in the national critical infrastructure / Donna A. Dulo
  • Technological context of cybersecurity and unmanned aircraft in the national critical infrastructure / Donna A. Dulo
  • Section 4: Constitutional issues of unmanned aircraft in the national airspace: Unmanned aircraft and the media / Donna A. Dulo
  • Sensing and surveillance / Hillary B. Farber
  • Civilian weapons on unmanned aircraft / Christine L. Keyzers
  • Section 5: Unmanned aircraft risk, product liability, and insurance: Unmanned aircraft product liability and risk management / Stephen S. Wu
  • Issues of unmanned aircraft insurance and insurance underwriting / David K. Beyer and Gale A. Townsley
  • Risk, product liability trends, and insurance in commercial unmanned aircraft / David K. Beyer, Donna A. Dulo, Gale A. Townsley, and Stephen S. Wu.
Law Library (Crown)
Book
1 volume (various pagings) : illustrations ; 28 cm + 1 DVD-ROM (4 3/4 in.)
  • Information governance as a framework for handling data--big and small--and e-discovery
  • Cloud and social media collection and analysis
  • Digital forensics in the cloud and on mobile devices plus a discussion on the role of forensics training
  • Relevant ESI here, there, and everywhere a Mock 26(F) meet & confer and 16(B) hearing
  • Judicial view on recent ESI decisions
  • Using predictive technologies to addressing IG problems
  • Standardizing e-discovery : status of and discussion on the international effort
  • A discussion of the FRCP amendment proposals
  • We can produce that file but it cannot be read : a mock spoliation hearing
  • Ethics : competence and the benefits and risks of technology
  • Information technology 101
  • Managing ESI within health information systems : now they've gone mobile.
Law Library (Crown)
Book
1 v. (various pagings) : ill. ; 28 cm. + 1 CD-ROM (4 3/4 in.)
  • Search, forward : will manual document review and keyword searches be replaced by computer-assisted coding? / Andrew Peck
  • Why information governance? / Barclay T. Blair
  • Getting started with information governance / Barclay T. Blair
  • The role of the CIO in information governance / Barclay T. Blair
  • Girding for battle : a clash is brewing between big data and e-discovery protocols / Barclay T. Blair
  • The rise of the proportionality principle and how to leverage it / Bennett B. Borden and Neil Magnuson
  • The search for professionalism in the changing world of electronic information / Julia L. Brickell
  • Legacy data cleanup : a 5-step plan / Julia L. Brickell
  • Technology-assisted review in e-discovery can be more effective and more efficient than exhaustive manual review / Maura R. Grossman and Gordon V. Cormack
  • Social media crossroads : an analysis of the law at the intersection of discovery and privacy in the realm of social media / Ethan J. Wall
  • Solid state drives : the beginning of the end for current practice in digital forensic recovery / Graeme B. Bell and Richard Boddington
  • Reliably erasing data from flash-based solid state drives / Michael Wei ... [et al.]
  • Two social media decisions / Steven W. Teppler
  • Empirical analysis of solid state disk data retention when used with contemporary operating systems / Christopher King and Timothy Vidas
  • Solid-state revolution : in-depth on how SSDs really work / Lee Hutchinson
  • Rule 303 and other evidentiary issues (presentation slides) / Paul W. Grimm
  • Technology-assisted review in e-discovery can be more effective and more efficient than exhaustive manual review / Maura R. Grossman and Gordon V. Cormack
  • iPads for lawyers / Adriana Linares
  • Admissibility of non-U.S. electronic evidence / Kenneth N. Rashbaum, Matthew F. Knouff, and Dominique Murray
  • Technology-assisted review in e-discovery can be more effective and more efficient than exhaustive manual review / Maura R. Grossman and Gordon V. Cormack
  • Inconsistent responsiveness determination in document review : difference of opinion or human error? / Maura R. Grossman and Gordon V. Cormack
  • The Grossman-Cormack glossary of technology-assisted review (November 2012)
  • Some thoughts on incentives, rules, and ethics concerning the use of search-technology in e-discovery / Maura R. Grossman and Gordon V. Cormack
  • More on the ethics of e-discovery : predictive coding and other forms of computer-assisted review / John M. Barkett
  • Navigating the uncharted waters of social media marketing and ethics / Ethan J. Wall
  • ISO 9001 : a foundation for e-discovery / Chris Knox and Scott Dawson
  • Model for e-discovery legal practice workflow and best practices / Ralph C. Losey
  • Law in the age of exabytes : some further thoughts on "information inflation" and current issues in e-discovery search / Jason R. Baron.
Law Library (Crown)
Book
xxvi, 318 pages : illustrations ; 26 cm
  • Electronic health records : how they work, what they document, and how they advance patient care / Don Quackenbush
  • Electronic health records : selecting the EHR solution and negotiating the licensing agreement / Lee Kim
  • Regional extension centers : "boots on the ground" support of EHR technology in small physician practices / Nathan Gibson, Nicholas P. Heesters Jr., and Adam Kehler
  • Personal health records and patient portals : leveraging technology to empower and engage patients / Stephen A. Snyder
  • Health information exchange : a critical foundation to improve health care values / Kate Berry and Jon Dimsdale
  • Telemedicine : an expanding frontier in patient care / Mary P. Maiberger
  • Electronic health and mobile health medical technology : platforms of innovation / Afia K. Asamoah, Sally Wang, Jessica A. von Reyn, and David J. Dykeman
  • Medical devices in the digital age / David J. Sykeman, Afia K. Asamoah, Jessica A. von Keyn, and Yuanheng "Sally" Wang
  • The role of social media in health care : the trend toward health care consumerism / Kathryn R. Coburn
  • 9/11 : a personal experience / Linda V. Tiano
  • Contingency planning for health plans and providers : lessons from 9/11 / Linda V. Tiano and Daly D.E. Temchine
  • The evolution of HIPAA : protecting the privacy of individuals in their physician's office, in the hospital, at the lab, as a subject of research, and throughout the world / Arthur E. Peabody Jr.
  • Electronic health records : technology standards and incentives for meaningful use / Arthur E. Peabody Jr.
  • The federal data breach notification law for breaches of protected health information / Arthur E. Peabody Jr. and Lucy J. Thomson
  • Safety risks associated with EHRs : how real? / Arthur E. Peabody Jr.
  • Health care data breaches and information security : addressing threats and risks to patient data / Lucy L. Thomson
  • Data encryption : essential to afford security and privacy in health care / Eric A. Hibbard
  • Enforcement under HIPAA and HITECH : why you need to worry again about HIPAA / Sarah E. Swank
  • Enforcing HIPAA in the age of electronic health records : the view of the Office of Civil Rights from its director / Leon Rodriguez.
Law Library (Crown)
Book
xxi, 385 p. : ill., map ; 23 cm.
Law Library (Crown)
Book
xxv, 328 p. : ill. ; 26 cm.
  • Cybercrime and escalating risks
  • Despite the alarming trends, data breaches are preventable
  • The aftermath of data breaches: potential liability and damages
  • The underground world of online identity theft : an overview
  • Encrypted records - failed security
  • Ambiguities in state security breach notification statutes
  • State data breach notification laws and the duty to provide information security
  • HITECH : the first federal data breach notification law
  • Breach notification and encryption : a global perspective
  • Encryption : the basics
  • Encryption best practices
  • Circumventing data encryption : password vulnerabilities
  • Managing cryptographic keys
  • The self-encrypting drive
  • Encryption technologies : a practical assessment
  • Security best practices : the watchword is prioritize!
  • Responding to data breaches
  • Technology to prevent data leaks
  • Insurance protection for security breaches.
Law Library (Crown)
Book
xx, 326 pages ; 23 cm
  • The social construction of the admissibility of the most frequently proffered varieties of expert testimony / Mara L. Merlino, Victoria Springer, and Alexandra Sigillo
  • Expert testimony in civil cases / Erica Beecher-Monas
  • Digital visual evidence / Roni Dahir
  • The jurors and courtroom of the future / Neal Feigenson and Christina Spiesel
  • The future of neuroscientific evidence / Stephen J. Morse
  • The future of DNA evidence / Christine Funk
  • The child witness / Jules Epstein
  • Evidence, privacy, and technology / Andrew E. Taslitz
  • Three prongs of the confession problem : issues and proposed solutions / Deborah Davis and Richard A. Leo
  • Research resources in technology, science and the law (keeping current) / Ken Strutin.
Law Library (Crown)
Book
x, 185 p. ; 23 cm.
  • Why license? : anatomy of a shrink-wrap license
  • Contract basics and drafting style
  • The universe of deals
  • Privity and integration
  • Ownership and transfer of intellectual property
  • License grants
  • Confidentiality and nondisclosure
  • Royalties
  • Bankruptcy and escrows
  • Selected topics on international licensing
  • Warranties, indemnities, and limitations of liability
  • Ethics and negotiation
  • Substantive review : miscellaneous contract law.
Law Library (Crown)
LAW-4011-01, LAW-4011-01
Book
xix, 429 p. : ill. ; 23 cm.
  • Discovery : the new philosophy
  • The Federal Rules of Civil Procedure : practical ESI analysis
  • Practical legal implications
  • Discovery technology innovations
  • Computer forensics
  • Electronic disclosure in UK litigation and investigations / Tracey Stretton, Mark Surguy
  • The past, present and future.
Law Library (Crown)

Articles+

Journal articles, e-books, & other e-resources
Articles+ results include