Chapter 30 resources for the Cyberlaw book
By John Bandler
This page has resources specific for this chapter.
Looking to navigate to another place?
- Cyberlaw Book Resources (main resources page)
- Cyberlaw main book page
- Udemy course on cyberlaw
- Previous chapter
- Next chapter
Chapter 30 Data breach notification laws
Chapter references, resources, and additional reading
- Chapter 30 resources, https://johnbandler.com/cyberlawbook-resources-ch30/ (this page)
- Data breach, https://johnbandler.com/data-breach/
- Data breach notification laws, https://johnbandler.com/data-breach-notification-laws/
- NCSL Security Breach Notification Laws, https://www.ncsl.org/technology-and-communication/security-breach-notification-laws
- IAPP, State Data Breach Notification Chart, https://iapp.org/resources/article/state-data-breach-notification-chart/
- NY General Business Law (GBL) §899-aa, Notification; person without valid authorization has acquired private information (“SHIELD Act”), https://www.nysenate.gov/legislation/laws/GBS/899-AA
- HIPAA breach notification rule, 45 CFR Subpart D, Notification in the Case of Breach of Unsecured Protected Health Information, https://www.law.cornell.edu/cfr/text/45/part-164/subpart-D
Chapter questions
- Coming soon?
Links and information
- The book: Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler
- Cyberlaw Book Resources (main resources page)
- Cyberlaw book FAQ
- Cyberlaw main book page
- Amazon - John's Author page
- Udemy online course on cyberlaw (other online courses too)
- Services
This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch30, copyright John Bandler, all rights reserved.
Originally posted 11/23/2024. Updated 11/23/2024.