Resources for the Book: Cyberlaw
Law for digital spaces and for information systems
By John Bandler
This page provides resources and links regarding my book and online course on cyberlaw. It is a work in progress.
The table of contents is listed below, with relevant resources and links for each chapter (as I get to it).
Looking for something else?
- See about the book and where to buy it at my main book page.
- See about my Udemy course on policies and procedures and coupon code
- See my book FAQ page
Table of Contents of the book (with linked resources)
Below is a chapter list with links to chapter references and additional reading for each chapter. This will evolve and is provided as a courtesy and free resource.
- About the author (on this website)
- Acknowledgements
- 0. Using the chapter resource pages
Part 1: Cyberlaw learning mindset
- 1. Why cyberlaw and using the book
- 2. Cyberlaw sits on a foundation of traditional law
- 3. Reading, learning, researching, writing, and artificial intelligence tools
Part 2: Introduction to law
- 4. Rules humans create, live by, and break
- 5. Laws introduced: Rules from government
- 6. Introducing the US legal system: Substantive laws and procedural laws (laws for conduct, and a process to investigate and resolve)
- 7. U.S. Constitution and Amendments: The foundation for law and government
- 8. Crime, criminal law, and criminal justice introduced
- 9. Civil law introduced
- 10. The First Amendment and protections for speech from government interference
- 11. The Fourth Amendment and government search and seizure
- 12. Jurisdiction
Part 3: Entering “cyberspace”
- 13. How did we get to cyberlaw?
- 14. Cybercrime and identity theft
- 15. Markets for your data and a need for privacy
- 16. Technology introduced
- 17. Cybersecurity introduced
- 18. Applying law to the digital domain
Part 4: Criminal cyberlaw
- Chapter list coming soon
- 19. The Western Express cybercrime case
- 20. Substantive cybercrime laws
- 21. Criminal procedure and gathering evidence
- Miscellaneous links for the Part
- Western Express Case, https://johnbandler.com/western-express-case/
- Criminal cyberlaw, https://johnbandler.com/criminal-cyberlaw/
- Spend ten minutes reading each of these statutes
- NY PL 156.05, Unauthorized use of a computer, 156.10, Computer Trespass, https://ypdcrime.com/penal.law/article156.php
- NY PL 155.00, Larceny and definitions, Petit Larceny, Grand Larceny in the Fourth Degree, https://ypdcrime.com/penal.law/article155.php
- Computer Fraud and Abuse Act (CFAA), 18 U.S. Code § 1030 - Fraud and related activity in connection with computers, https://www.law.cornell.edu/uscode/text/18/1030
- Electronic Communications Privacy Act (ECPA),
- Title I: Wiretap Act 18 U.S.C. §§ 2510–2523, https://www.law.cornell.edu/uscode/text/18/part-I/chapter-119
- Title II: Stored Communications Act (SCA) 18 U.S.C. §§ 2701–2713, https://www.law.cornell.edu/uscode/text/18/2713
- Title III: Pen Registers and trap and trace devices 18 U.S.C. §§ 3121–3127, https://www.law.cornell.edu/uscode/text/18/part-II/chapter-206
- Virtual Currency (including cryptocurrency, virtual assets..), https://johnbandler.com/virtual-currency-virtual-assets-cryptocurrency/
- Virtual Currency References, https://johnbandler.com/virtual-currency-references/
- Money Laundering, https://johnbandler.com/money-laundering/
- Money Mule, https://johnbandler.com/money-mule/
- Cryptocurrency past is prologue: before and after FTX, https://johnbandler.com/cryptocurrency-past-is-prologue-before-and-after-ftx/ to access the PDF file at https://johnbandler.com/wp-content/uploads/2023/01/Bandler-ReutersLN-Cryptocurrency-Past-Prologue-2023-01-17.pdf
- Solving the cybercrime problem, https://johnbandler.com/solving-the-cybercrime-problem/, to access the PDF file at https://johnbandler.com/wp-content/uploads/2023/03/Bandler-ReutersLN-Cybercrime-Problem-2023-3-21.pdf
Part 5: Civil cyberlaw I
- Chapter list coming soon
- Miscellaneous links for the Part
- Negligence Law, https://johnbandler.com/negligence-law/
- Premises Liability Law, https://johnbandler.com/premises-liability-law/
- Contract Law, https://johnbandler.com/contract-law/
- Cyber insurance, https://johnbandler.com/cyber-insurance/
- Intellectual property law overview, https://johnbandler.com/intellectual-property-law/
- Copyright law, https://johnbandler.com/intellectual-property-law/copyright/
- Trademark law, https://johnbandler.com/intellectual-property-law/trademark/
- Patent law, https://johnbandler.com/intellectual-property-law/patent/
- Trade secrets law, https://johnbandler.com/intellectual-property-law/trade-secrets/
Part 6: Civil cyberlaw II: Data law
- Chapter list coming soon
- Miscellaneous links for the Part
- Cybersecurity Laws and Regulations 1, https://johnbandler.com/cybersecurity-laws-and-regulations-1/
- New York Cybersecurity Requirements and the SHIELD Act, https://johnbandler.com/new-york-cybersecurity-requirements-and-the-shield-act
- NYS Data breach notification statute, NY GBL 899-aa https://www.nysenate.gov/legislation/laws/GBS/899-AA
- NYS Cybersecurity statute, NY GBL 899-bb https://www.nysenate.gov/legislation/laws/GBS/899-BB
- Privacy, https://johnbandler.com/privacy/
- FORTHCOMING Privacy laws
- Consumer privacy rights, Consumer privacy rights
- Cybersecurity Laws and Regulations 1, https://johnbandler.com/cybersecurity-laws-and-regulations-1/
- FTC Act, https://johnbandler.com/ftc-act/
- Cybersecurity Laws and Regulations Part 2, https://johnbandler.com/cybersecurity-laws-and-regulations-2/
- 10 minutes reading: FTC Act, 15 USC §45, https://www.law.cornell.edu/uscode/text/15/45
- 10 minutes reading about California’s privacy law (CCPA), at https://cppa.ca.gov/regulations/
- Health Sector Laws and Regulations, https://johnbandler.com/health-sector-laws-and-regulations/
- Financial Sector Laws and Regulations, https://johnbandler.com/financial-sector-cyber-laws-regulations/
Part 7: International cyber actions
- Chapter list coming soon
- Miscellaneous links for the Part
- International cyber conflict, https://johnbandler.com/cyber-conflict/
- UN Charter Article 1 and 2, especially 2(4), https://www.un.org/en/about-us/un-charter/chapter-1
- UN Charter Article 51, https://www.un.org/en/about-us/un-charter/chapter-7
- Tallinn Manual general information including, https://ccdcoe.org/research/tallinn-manual/ and https://en.wikipedia.org/wiki/Tallinn_Manual
- “Mueller Report” Executive Summaries (Report on The Investigation into Russian Interference in the 2016 Presidential Election),
- Michael Schmitt, Grey Zones in the International Law of Cyberspace, Yale Journal of International Law (October 18, 2017), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180687
- Michael N. Schmitt, Foreign Cyber Interference in Elections, 97 INT’L L. STUD. 739 (2021), at https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2969&context=ils, via https://digital-commons.usnwc.edu/ils/vol97/iss1/32/
Part 8: Speech and expression in depth
- Chapter list coming soon
- Miscellaneous links for the Part
- Free Speech, the First Amendment, and Social Media (2), https://johnbandler.com/free-speech-first-amendment-social-media-2/
- First Amendment things to know, https://johnbandler.com/things-to-know-first-amendment/
- Communications Decency Act 47 U.S. Code § 230 - Protection for private blocking and screening of offensive material, https://www.law.cornell.edu/uscode/text/47/230
Part 9: Organizations and cyberlaw
- Chapter list coming soon
- Miscellaneous links for the Part
- Business Basics and Law - An Introduction, https://johnbandler.com/business-basics-and-law/
- Risk, https://johnbandler.com/risk/
- Five Components for Policy Work,
https://johnbandler.com/five-components-for-policy-work/ - Three Platforms to Connect for Compliance,
https://johnbandler.com/bandlers-three-platforms-to-connect/ - Fourth Platform to Connect,
https://johnbandler.com/bandlers-fourth-platform-to-connect/ - External guidance, https://johnbandler.com/external-guidance/
- Cybersecurity frameworks and guidance, https://johnbandler.com/cybersecurity-frameworks-and-guidance/
- NIST cybersecurity framework, https://johnbandler.com/nist-cybersecurity-framework/
- Four Pillars of Cybersecurity,
https://johnbandler.com/bandlers-four-pillars-of-cybersecurity/
Part 10: Conclusion, Resources, Appendix
- Chapter list coming soon
Frequently asked questions (FAQ)
Details and ISBN
- Title: Cyberlaw: Law for Digital Spaces and Information Systems
- Author and Publisher: John Bandler
- 1st Edition, 2024 (forthcoming)
- Library of Congress Control Number (LCCN) TBD
- First edition ISBNs (2024, current edition)
- Paperback, ISBN TBD
- Hardcover ("hardback"): ISBN TBD
- eBook: ISBN TBD
Links
- Purchase the book
- More about the book on this site
- Amazon book links
- Paperback, $24.95, LINK TBD
- Hardcover, $34.95, LINK TBD
- eBook, $14.95, LINK TBD
- Amazon - John's Author page
- Purchase the online course
- See my Udemy page for links and coupon codes (Cyberlaw course is free for now)
- Resources on this website on Cyberlaw:
- See above for a chapter-by-chapter links (when available)
- See these course reading lists (undergrad and law school)
- Services
- Cybersecurity Services
This page is hosted at https://johnbandler.com/cyberlawbook-resources, copyright John Bandler, all rights reserved.
Originally posted 6/24/2024. Updated 11/13/2024.