Privacy
» Cybersecurity
-
By Rhodes, Jill D. American Bar Association. Third edition. 2022.
The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals, Second Edition is published by the ABA Cybersecurity Legal Task Force which is composed of ABA members with expertise in cybersecurity as well as government, technical and private sector representation. The Second Edition of this top selling cybersecurity book is a must read for anyone working in the field including private practice attorneys and associates, in-house counsel, non-profit and government attorneys and others. Since the release of the first edition published in 2013, cybersecurity breaches in law firms have made news headlines and clients are asking questions about lawyers' and firms' security programs. From the massive Panama Papers breach that led to the dissolution of the Mossack Fonseca Law Firm in April 2016 to the WannaCry and Petya Ransomware attacks, the latter that led to the several day work outage at DLA Piper in June 2017, it is imperative that attorneys understan…
Read online: https://lexisdl.com/library/txsll/title/3899456
-
By Rhodes, Jill D. American Bar Association. Third edition. 2018.
This third edition of The ABA Cybersecurity Handbook updates and expands upon the issues raised in the first two editions. The cybersecurity landscape has undergone seismic changes since the publication of the second edition in 2017. The COVID-19 pandemic has brought new levels of technology integration to the practice of law, accompanied by new and expanded cybersecurity risks. Beyond the legal profession, the SolarWinds, Kaseya, and Colonial Pipeline breaches have set new and alarming precedents. Heightened cybersecurity risk worldwide has prompted increased responses from the US federal government and from the international community. Amid these ongoing developments, the Handbook is at your fingertips as a guide to preparing for and responding to cybersecurity threats and incidents. The foundational information it shares will remain relevant even in a changing environment. The recommendations within each chapter, located at the end, provide an easy guide for developing and imple…
URL: https://lexisdl.com/library/txsll/title/3899456
-
By Robinson, Nicholas A. RAND Corporation. 2011.
This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
Read online: https://lexisdl.com/library/txsll/title/680165
-
Latest received: Automatic updates. Aspen Law & Business. c2000-.
The Computer & Internet Lawyer provides action-oriented guidance by nationally known computer lawyers to resolve the problems that face manufacturers, developers, distributors, and users of computer, telecommunication and online products and services.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=253711141
-
By Kesan, Jay P. West Academic Publishing. First edition. 2019.
The reliance on technology and the internet during the COVID-19 pandemic has led to an increase in cybersecurity attacks. This Nutshell volume compiles information about state, federal, and international laws related to cybersecurity and data privacy.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26367
-
By Bandler, John T. American Bar Association. 1;2017-09. 2017.
Why this book? Most have neither considered, nor know how "cyber secure" they are. For the majority who are not information technology (IT) professionals, the idea of delving into the technical details of secure computing can create apprehension and confusion. Some people think that if their email system works, and if their documents are accessible, then why bother making any security improvements to their system, which might create complications or cost time and money. Some would prefer not to know the cybercrime risks they are facing, or just haven't thought about it. Cybersecurity is more, though; it is also about protecting data from risks other than cybercrime, such as unanticipated IT issues, hard-drive crashes, house fires, and other incidents. Beyond security, this book will also provide information to use computers and data more efficiently. No matter an individual's level of comfort or experience with computers, this book will help recognize when electronic "doors" are open …
Read online: http://lexisdl.com/library/txsll/title/3596015
-
By Mireles, Michael S. West Academic Publishing. First edition. 2021, c2022.
This book provides an overview of cybersecurity laws. It discusses state laws on student privacy and data breach notification, federal laws such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act, and other topics including ransomware, hacking, and the Internet of Things.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27697
-
By Brummer, Chris. West Academic. First edition. 2019.
This title provides an overview of financial technology services and the rules that regulate them.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26685
-
By Rustad, Michael. West Academic Publishing. Fourth edition. 2021.
This timely and up-to-date Hornbook comprehensively examines topics such as Internet technologies, Internet governance, global consumer protection, cybertorts, Internet-related privacy, copyright, trademarks and domain names.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27638
-
By Gantt, Andrew. American Bar Association. 2021.
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information. The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
URL: https://lexisdl.com/library/txsll/title/6439034
-
By Law, Section of Science and Technology. American Bar Association. 1;1. 2014.
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools you need to handle the business, legal and technical risks of protecting information on a global scale. For anyone responsible for or advising a corporation involved in domestic or international business, who must comply with a dizzying array of statutes, regulations, technologies, methodologies and standards, this book is the invaluable resource you've been looking for.
Read online: http://lexisdl.com/library/txsll/title/1744172
-
Latest received: Automatic updates. Aspen Law & Business. Tenth edition. [c2011?]-.
"Internet and Technology Law Desk Reference, Tenth Edition is the best reference to explain today's high-tech terms, legal doctrines, acronyms, and jargon, as the terms have been defined in court decisions, statutes, regulations, or industry usage. The Internet and Technology Law Desk Reference covers over 2,400 legal and technical terms - the most comprehensive listing of its kind. So you can advise clients, draft contracts, and litigate cases, confident that you're using accurate terminology backed by legal precedent." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/results?docUid=68468314
-
By Cwik, Cynthia H. American Bar Association. 1;2019-05. 2019.
The Internet of Things encompasses the ability to connect and direct almost any kind of mechanical system, whether it's automotive, medical, residential, or critical infrastructure. IoT technologies hold tremendous promise for our communities by making them safer and more efficient. As with any other technology, they also entail security risk, and the risks associated with IoT technologies must be aggressively managed. We can do so, with industry's help, by working to leverage standards and liability and insurance mechanisms to ensure that IoT's foundational building blocks are secure and effective. Increasingly, utilities are deploying smart grid technologies, wirelessly connecting thermostats to the utility to measure usage patterns and allow energy supplies to be adjusted, with precision based on need. Companies are working on clocks, kitchen appliances, and other household products that monitor consumer behavior to turn on your coffee machine moments before you wake up; warn you wh…
Read online: http://lexisdl.com/library/txsll/title/4742306
-
By Spernow, Bill. American Bar Association. 1;2017-05. 2017.
Law firms can mitigate the risk of a data breach through a variety of means, including: investing in cybersecurity tools, hiring internal and external cyber resources to augment the firm's current information security practices, and arguably most importantly changing the firm's culture to be more security conscious. No one size fits all solution exists for dealing with cyber threats, but with proper focus and resources, a firm can consider its unique factors and develop an information security posture that addresses its most compelling concerns. While preventing a breach should be a paramount concern for any law firm, it is similarly important to prepare for what happens in the event that a breach occurs. Although there are options, such as cyber insurance, to help mitigate the direct costs of a breach, law firms must also look to other options to resolve these issues expeditiously. As the costs associated with litigating data breach claims continues to climb, it will become increasing…
Read online: http://lexisdl.com/library/txsll/title/3293631
-
Latest received: Automatic updates. By Delta, George B. Aspen Publishers. Fourth edition. [2018?]-.
"This up-to-date legal resource covers electronic commerce and online contracts, privacy and network security, intellectual property and online content management, secure electronic transactions, cryptography, and digital signatures, protecting intellectual property online through link licenses, frame control and other methods, online financial services and securities transactions, antitrust and other liability." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=171725224
-
By Nelson, Sharon D. American Bar Association. 1;2016-06. 2016.
In the four years since the initial publication of Locked Down, data security has exploded as a concern for law firms. At the time, many attorneys were not paying attention to data security. But with the growing number of data breaches, no attorney can afford to ignore these developments. With quickly advancing technology to prevent, detect and respond to intrusions and ever-evolving threats, keeping up on the latest information you need to protect your confidential data can be a daunting task. The second edition of Locked Down is the answer to this challenge. Authors Sharon D. Nelson, David G. Ries, and John W. Simek are recognized experts in cybersecurity, and their lectures draw standing-room-only crowds. They give you the data security basics you need in simple, easy-to-understand language. You can manage your risk by following the practical advice provided in this book.
Read online: http://lexisdl.com/library/txsll/title/2821678
-
By Carter, T. Barton. West Academic Publishing. Eighth edition. 2020.
"Mass Communication Law in a Nutshell satisfies the need for a basic text in communication law, not only for law students but for journalism and communication students as well. Highlights of the Eighth Edition of the popular book include a discussion of Hulk Hogan’s successful lawsuit against Gawker for public disclosure of private facts, the right to be forgotten (or “erased”) in Europe, and numerous social media issues, including cyberstalking, catfishing, trolling, doxing, swatting, posting threats on Facebook and access to President Trump’s tweets. Further highlights include the USA FREEDOM Act, the Supreme Court’s expansion of exemption 4 of FOIA, First Amendment limits on denials of trademark registration, the Broadcast Spectrum Auction, and the continuing battle over net neutrality." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26766
-
By Mireles, Michael. West Academic Publishing. Second edition. 2024.
"This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity’s business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO’s technical cybersecurity issues and how they fit into today’s cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any disc…
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=28367
-
By Soma, John T. West Academic Publishing. Second edition. 2014.
"The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy “crisis” with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23394
-
By Serwin, Andrew B. American Bar Association. 1;1. 2014.
Information security and privacy issues are not new, but mass attention and compliance efforts are at an all-time high, and are increasing as litigation and high-profile security breaches continue to draw attention. Current hot topics in information security and privacy include pretexting; financial privacy; privacy litigation; outsourcing to foreign countries; electronic health and personal records; and social networking. With these issues, a large number of laws have been passed to regulate the information security and privacy issues. Compliance with these laws is a legal reality as well as a business necessity. Privacy, Security and Information Management will help you decipher that laws that regulate these issues and help your clients and business comply with the requirements to avoid security and privacy breaches. Topics covered include internet privacy, financial privacy, unauthorized access to networks and information, wiretapping and privacy in electronic communications, iden…
Read online: http://lexisdl.com/library/txsll/title/1744216
» Medical Records
-
By Hall, Mark A. West Academic. Fourth edition. 2020.
"Public policy responses to escalating medical costs and constrained access pose fundamental challenges to health care law. Profound medical advances also generate many ethical dilemmas. This authoritative discussion considers how law and ethics respond to these driving social, economic, and political forces of innovation, crisis and reform. Topics include health insurance reform, health care finance and delivery structures, treatment relationships, facility and insurance regulation, corporate and tax law, refusal of life support, organ donation, and reproductive technologies." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26779
-
By Furrow, Barry R. West Academic Publishing. Third edition. 2015.
"Expert authors present an up-to-date overview of health law as it affects the professionals, institutions, and entities that deliver and finance health care in the United States. Considers the law's response to quality and error through institutional and professional regulation, and malpractice litigation against professionals, hospitals, and managed care organizations. Surveys tax, corporate, and organizational issues. Explores the government's efforts to control costs and expand access through Medicare and Medicaid. Examines government attempts to police anticompetitive activities, fraud, and abuse. And considers the legal and ethical issues involving death, human reproduction, medical treatment decision making, and medical research. The Affordable Care Act, HIPAA, HITECH, and other new statutory and regulatory changes of the past few years are thoroughly incorporated in all aspects of the legal discussion." - publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23865
-
By Gantt, Andrew. American Bar Association. 2021.
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information. The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
URL: https://lexisdl.com/library/txsll/title/6439034
-
By Sullivan, June M. American Bar Association. 2;2020-03. 2020.
HIPAA privacy regulations have been the subject of countless hours of study, analysis, and compliance efforts within the health care industry and beyond. Almost two decades later, and more than 15 years after the first edition of this book, the privacy and security requirements of HIPAA are the subject of significant confusion and uncertainty. As the laws and social pressure evolve and tighten the reigns on health care privacy, patients and providers will continue to become more concerned about maintaining the security and privacy of data while rising to the challenge of balancing privacy while promoting patient access and quality care. This revised and updated edition creates a useful guide for those who are new to HIPAA as well as provide updates for seasoned veterans of HIPAA. This book expands on the first edition and includes the Security Rule, the HITECH Act, and the Breach Notification Rule along with extensive discussion about HIPAA's parameters, practical applications, and les…
Read online: http://lexisdl.com/library/txsll/title/5378649
-
By Eades, Ronald W. LexisNexis. Sixth edition. c2004.
This volume provides current instructions on the most recent medical issues. It covers more than 200 medical issues including standards of care, childbirth, patient consent, pre-existing conditions, and allergies. Legal concepts and issues are presented in sample instructions using understandable terms.
Read online: https://lexisdl.com/library/txsll/title/1000166
-
By Soma, John T. West Academic Publishing. Second edition. 2014.
"The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy “crisis” with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23394
-
By Rose, Rachel V. American Bar Association. 1;1. 2015.
As part of the “What Is” series, the purpose is to provide a preliminary overview of HIPAA and the HITECH Act in relation to correlating international laws in some strategic countries, as well as providing practical guidance for evaluating business associates and executing business associate agreements. Three countries in particular will be highlighted: the U.S., the U.K. and India. This gives a perspective on the U.S. laws in relation to an established market and an emerging market, whose laws and their enforcement vary widely.
Read online: http://lexisdl.com/library/txsll/title/2393276
» Search & Seizure
The ‘Gold star icon’ icon indicates a Texas title
-
This is a featured Texas title Texas criminal practice guide
By Matthew Bender (Firm). M. Bender. 1979-.
"This guide's six volumes are arranged by section to correspond with the progression of the Texas criminal justice system, making their detailed information easy to access. Each volume contains a number of chapters divided into four parts covering legal backgrounds, procedural practice tips, sample forms, and research resources and bibliographies." - publisher's description
Read online: https://lexisdl.com/library/txsll/set/501787
Read online Table of contents View details in library catalog
-
By Bergman, Paul. Nolo. Eighteenth edition. 2024.
"In plain English, [this book] covers: search and seizure, drunk driving, arrests, booking and bail, public defenders, arraignment, lineups, preliminary hearings, trials, plea bargains, common defenses, evidence, sentencing, appeals."--Page [4] of cover.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=lir&jid=NE6O&site=lirc-live
-
By Israel, Jerold H. West Academic Publishing. Ninth edition. c2020.
"This nutshell is intended for use by law students of constitutional criminal procedure. It is a succinct analysis of the constitutional standards of major current significance. This is not a text on criminal procedure, but rather about constitutional criminal procedure. It avoids describing the non-constitutional standards applied in each state and federally. The text provides the scope and highlights you need to excel in understanding this field. This will enable you to answer exam questions more quickly and accurately, and enhance your skills as an attorney." - publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26671
-
By del Carmen, Rolando V. 2010.
In any episode of the popular television show Law and Order, questions of police procedure in collecting evidence often arise. Was a search legal? Was the evidence obtained lawfully? Did the police follow the rules in pursuing their case? While the show depicts fictional cases and scenarios, police procedure with regard to search and seizure is a real and significant issue in the criminal justice system today. The subject of many Supreme Court decisions, they seriously impact the way police pursue their investigations, the way prosecutors proceed with their cases, and the way defense attorneys defend their clients. This book answers these questions and explains these decisions in accessible and easy to follow language. Each chapter explores a separate case or series of cases involving the application of the Fourth Amendment to current police investigatory practices or prosecutorial conduct of the criminal trial. The police-related cases involve topics such as searches of...
Read online: https://lexisdl.com/library/txsll/title/469158
-
By Branham, Lynn S. West Academic Publishing. Eleventh edition. 2022.
"An excellent reference tool, this book explores a range of sentencing-related topics, including the principal purposes of criminal sentences, restorative justice, guilty pleas and plea bargaining, different ways to structure sentencing systems, procedural rights during sentencing proceedings, sentencing evidence, community-based sentences, the death penalty, Eighth Amendment constraints on sentences in noncapital cases, parole release, probation and parole revocation, and enmeshed penalties (often called the “collateral consequences” of a conviction). The latter half of the book contains an illuminating overview of the constitutional rights of incarcerated people, details on litigating their civil-rights suits challenging conditions of confinement and their treatment while incarcerated, and the remedies available to them." - publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27973
-
By Alexander, Kern. West Academic Publishing. Seventh edition. 2022.
"This text captures the key points of the precedents governing student rights and responsibilities relating to attendance, speech, expression, religion, discipline, grades, tests, drugs, search and seizure, the emerging law of social media, i.e., cyberbullying, and the range of procedural due process interests. The book further addresses the range of constitutional rights and protections for teachers as well as employment terms and conditions, including contracts, tenure and potential liabilities." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27791
-
By Weaver, Russell L. West Academic Publishing. Eighth edition. 2024.
"This book gives you everything you need to know about basic criminal procedure principles, presented in a no-nonsense fashion. It includes references to recent, relevant decisions handed down by the United States Supreme Court. In addition, Principles of Criminal Procedure contains helpful study devices such as 'focal points' at the beginning of each chapter, and 'points to remember' at the end of each section. This is the only study aid you will need to help you understand basic criminal procedure principles in U.S. law." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=28387
-
By LaFave, Wayne. West. Second edition. 2009.
This book examines the constitutionalization of criminal procedure and focuses on various investigative procedures.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=20452
-
By Abramson, Leslie W. West Academic Publishing. First edition. 2021, c2022.
This title, available online through West Academic, examines how various landmark decisions and other more nuanced cases shape the way the Fourth, Fifth, and Sixth Amendments can influence criminal investigations. With chapters on probable cause, search warrants, and right to counsel, this title is designed to supply attorneys and law students with a “comprehensive though concise” treatise.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27691
-
By Soma, John T. West Academic Publishing. Second edition. 2014.
"The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy “crisis” with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23394
» All Titles
The ‘Gold star icon’ icon indicates a Texas title
-
This is a featured Texas title Texas criminal practice guide
By Matthew Bender (Firm). M. Bender. 1979-.
"This guide's six volumes are arranged by section to correspond with the progression of the Texas criminal justice system, making their detailed information easy to access. Each volume contains a number of chapters divided into four parts covering legal backgrounds, procedural practice tips, sample forms, and research resources and bibliographies." - publisher's description
Read online: https://lexisdl.com/library/txsll/set/501787
Read online Table of contents View details in library catalog
-
By Israel, Jerold H. West Academic Publishing. Ninth edition. c2020.
"This nutshell is intended for use by law students of constitutional criminal procedure. It is a succinct analysis of the constitutional standards of major current significance. This is not a text on criminal procedure, but rather about constitutional criminal procedure. It avoids describing the non-constitutional standards applied in each state and federally. The text provides the scope and highlights you need to excel in understanding this field. This will enable you to answer exam questions more quickly and accurately, and enhance your skills as an attorney." - publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26671
-
By del Carmen, Rolando V. 2010.
In any episode of the popular television show Law and Order, questions of police procedure in collecting evidence often arise. Was a search legal? Was the evidence obtained lawfully? Did the police follow the rules in pursuing their case? While the show depicts fictional cases and scenarios, police procedure with regard to search and seizure is a real and significant issue in the criminal justice system today. The subject of many Supreme Court decisions, they seriously impact the way police pursue their investigations, the way prosecutors proceed with their cases, and the way defense attorneys defend their clients. This book answers these questions and explains these decisions in accessible and easy to follow language. Each chapter explores a separate case or series of cases involving the application of the Fourth Amendment to current police investigatory practices or prosecutorial conduct of the criminal trial. The police-related cases involve topics such as searches of...
Read online: https://lexisdl.com/library/txsll/title/469158
-
By Kesan, Jay P. West Academic Publishing. First edition. 2019.
The reliance on technology and the internet during the COVID-19 pandemic has led to an increase in cybersecurity attacks. This Nutshell volume compiles information about state, federal, and international laws related to cybersecurity and data privacy.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26367
-
By Bandler, John T. American Bar Association. 1;2017-09. 2017.
Why this book? Most have neither considered, nor know how "cyber secure" they are. For the majority who are not information technology (IT) professionals, the idea of delving into the technical details of secure computing can create apprehension and confusion. Some people think that if their email system works, and if their documents are accessible, then why bother making any security improvements to their system, which might create complications or cost time and money. Some would prefer not to know the cybercrime risks they are facing, or just haven't thought about it. Cybersecurity is more, though; it is also about protecting data from risks other than cybercrime, such as unanticipated IT issues, hard-drive crashes, house fires, and other incidents. Beyond security, this book will also provide information to use computers and data more efficiently. No matter an individual's level of comfort or experience with computers, this book will help recognize when electronic "doors" are open …
Read online: http://lexisdl.com/library/txsll/title/3596015
-
By Mireles, Michael S. West Academic Publishing. First edition. 2021, c2022.
This book provides an overview of cybersecurity laws. It discusses state laws on student privacy and data breach notification, federal laws such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act, and other topics including ransomware, hacking, and the Internet of Things.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27697
-
By Brummer, Chris. West Academic. First edition. 2019.
This title provides an overview of financial technology services and the rules that regulate them.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26685
-
By Rustad, Michael. West Academic Publishing. Fourth edition. 2021.
This timely and up-to-date Hornbook comprehensively examines topics such as Internet technologies, Internet governance, global consumer protection, cybertorts, Internet-related privacy, copyright, trademarks and domain names.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27638
-
By Hall, Mark A. West Academic. Fourth edition. 2020.
"Public policy responses to escalating medical costs and constrained access pose fundamental challenges to health care law. Profound medical advances also generate many ethical dilemmas. This authoritative discussion considers how law and ethics respond to these driving social, economic, and political forces of innovation, crisis and reform. Topics include health insurance reform, health care finance and delivery structures, treatment relationships, facility and insurance regulation, corporate and tax law, refusal of life support, organ donation, and reproductive technologies." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26779
-
By Furrow, Barry R. West Academic Publishing. Third edition. 2015.
"Expert authors present an up-to-date overview of health law as it affects the professionals, institutions, and entities that deliver and finance health care in the United States. Considers the law's response to quality and error through institutional and professional regulation, and malpractice litigation against professionals, hospitals, and managed care organizations. Surveys tax, corporate, and organizational issues. Explores the government's efforts to control costs and expand access through Medicare and Medicaid. Examines government attempts to police anticompetitive activities, fraud, and abuse. And considers the legal and ethical issues involving death, human reproduction, medical treatment decision making, and medical research. The Affordable Care Act, HIPAA, HITECH, and other new statutory and regulatory changes of the past few years are thoroughly incorporated in all aspects of the legal discussion." - publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23865
-
By Gantt, Andrew. American Bar Association. 2021.
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information. The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
URL: https://lexisdl.com/library/txsll/title/6439034
-
By Sullivan, June M. American Bar Association. 2;2020-03. 2020.
HIPAA privacy regulations have been the subject of countless hours of study, analysis, and compliance efforts within the health care industry and beyond. Almost two decades later, and more than 15 years after the first edition of this book, the privacy and security requirements of HIPAA are the subject of significant confusion and uncertainty. As the laws and social pressure evolve and tighten the reigns on health care privacy, patients and providers will continue to become more concerned about maintaining the security and privacy of data while rising to the challenge of balancing privacy while promoting patient access and quality care. This revised and updated edition creates a useful guide for those who are new to HIPAA as well as provide updates for seasoned veterans of HIPAA. This book expands on the first edition and includes the Security Rule, the HITECH Act, and the Breach Notification Rule along with extensive discussion about HIPAA's parameters, practical applications, and les…
Read online: http://lexisdl.com/library/txsll/title/5378649
-
By Law, Section of Science and Technology. American Bar Association. 1;1. 2014.
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools you need to handle the business, legal and technical risks of protecting information on a global scale. For anyone responsible for or advising a corporation involved in domestic or international business, who must comply with a dizzying array of statutes, regulations, technologies, methodologies and standards, this book is the invaluable resource you've been looking for.
Read online: http://lexisdl.com/library/txsll/title/1744172
-
Latest received: Automatic updates. Aspen Law & Business. Tenth edition. [c2011?]-.
"Internet and Technology Law Desk Reference, Tenth Edition is the best reference to explain today's high-tech terms, legal doctrines, acronyms, and jargon, as the terms have been defined in court decisions, statutes, regulations, or industry usage. The Internet and Technology Law Desk Reference covers over 2,400 legal and technical terms - the most comprehensive listing of its kind. So you can advise clients, draft contracts, and litigate cases, confident that you're using accurate terminology backed by legal precedent." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/results?docUid=68468314
-
By Eades, Ronald W. LexisNexis. Sixth edition. c2004.
This volume provides current instructions on the most recent medical issues. It covers more than 200 medical issues including standards of care, childbirth, patient consent, pre-existing conditions, and allergies. Legal concepts and issues are presented in sample instructions using understandable terms.
Read online: https://lexisdl.com/library/txsll/title/1000166
-
By Spernow, Bill. American Bar Association. 1;2017-05. 2017.
Law firms can mitigate the risk of a data breach through a variety of means, including: investing in cybersecurity tools, hiring internal and external cyber resources to augment the firm's current information security practices, and arguably most importantly changing the firm's culture to be more security conscious. No one size fits all solution exists for dealing with cyber threats, but with proper focus and resources, a firm can consider its unique factors and develop an information security posture that addresses its most compelling concerns. While preventing a breach should be a paramount concern for any law firm, it is similarly important to prepare for what happens in the event that a breach occurs. Although there are options, such as cyber insurance, to help mitigate the direct costs of a breach, law firms must also look to other options to resolve these issues expeditiously. As the costs associated with litigating data breach claims continues to climb, it will become increasing…
Read online: http://lexisdl.com/library/txsll/title/3293631
-
Latest received: Automatic updates. By Delta, George B. Aspen Publishers. Fourth edition. [2018?]-.
"This up-to-date legal resource covers electronic commerce and online contracts, privacy and network security, intellectual property and online content management, secure electronic transactions, cryptography, and digital signatures, protecting intellectual property online through link licenses, frame control and other methods, online financial services and securities transactions, antitrust and other liability." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=171725224
-
By Nelson, Sharon D. American Bar Association. 1;2016-06. 2016.
In the four years since the initial publication of Locked Down, data security has exploded as a concern for law firms. At the time, many attorneys were not paying attention to data security. But with the growing number of data breaches, no attorney can afford to ignore these developments. With quickly advancing technology to prevent, detect and respond to intrusions and ever-evolving threats, keeping up on the latest information you need to protect your confidential data can be a daunting task. The second edition of Locked Down is the answer to this challenge. Authors Sharon D. Nelson, David G. Ries, and John W. Simek are recognized experts in cybersecurity, and their lectures draw standing-room-only crowds. They give you the data security basics you need in simple, easy-to-understand language. You can manage your risk by following the practical advice provided in this book.
Read online: http://lexisdl.com/library/txsll/title/2821678
-
By Carter, T. Barton. West Academic Publishing. Eighth edition. 2020.
"Mass Communication Law in a Nutshell satisfies the need for a basic text in communication law, not only for law students but for journalism and communication students as well. Highlights of the Eighth Edition of the popular book include a discussion of Hulk Hogan’s successful lawsuit against Gawker for public disclosure of private facts, the right to be forgotten (or “erased”) in Europe, and numerous social media issues, including cyberstalking, catfishing, trolling, doxing, swatting, posting threats on Facebook and access to President Trump’s tweets. Further highlights include the USA FREEDOM Act, the Supreme Court’s expansion of exemption 4 of FOIA, First Amendment limits on denials of trademark registration, the Broadcast Spectrum Auction, and the continuing battle over net neutrality." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26766
-
By Weaver, Russell L. West Academic Publishing. Eighth edition. 2024.
"This book gives you everything you need to know about basic criminal procedure principles, presented in a no-nonsense fashion. It includes references to recent, relevant decisions handed down by the United States Supreme Court. In addition, Principles of Criminal Procedure contains helpful study devices such as 'focal points' at the beginning of each chapter, and 'points to remember' at the end of each section. This is the only study aid you will need to help you understand basic criminal procedure principles in U.S. law." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=28387
-
By LaFave, Wayne. West. Second edition. 2009.
This book examines the constitutionalization of criminal procedure and focuses on various investigative procedures.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=20452
-
By Mireles, Michael. West Academic Publishing. Second edition. 2024.
"This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity’s business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO’s technical cybersecurity issues and how they fit into today’s cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any disc…
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=28367
-
By Abramson, Leslie W. West Academic Publishing. First edition. 2021, c2022.
This title, available online through West Academic, examines how various landmark decisions and other more nuanced cases shape the way the Fourth, Fifth, and Sixth Amendments can influence criminal investigations. With chapters on probable cause, search warrants, and right to counsel, this title is designed to supply attorneys and law students with a “comprehensive though concise” treatise.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27691
-
By Soma, John T. West Academic Publishing. Second edition. 2014.
"The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy “crisis” with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23394
-
By Serwin, Andrew B. American Bar Association. 1;1. 2014.
Information security and privacy issues are not new, but mass attention and compliance efforts are at an all-time high, and are increasing as litigation and high-profile security breaches continue to draw attention. Current hot topics in information security and privacy include pretexting; financial privacy; privacy litigation; outsourcing to foreign countries; electronic health and personal records; and social networking. With these issues, a large number of laws have been passed to regulate the information security and privacy issues. Compliance with these laws is a legal reality as well as a business necessity. Privacy, Security and Information Management will help you decipher that laws that regulate these issues and help your clients and business comply with the requirements to avoid security and privacy breaches. Topics covered include internet privacy, financial privacy, unauthorized access to networks and information, wiretapping and privacy in electronic communications, iden…
Read online: http://lexisdl.com/library/txsll/title/1744216
-
By Rhodes, Jill D. American Bar Association. Third edition. 2022.
The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals, Second Edition is published by the ABA Cybersecurity Legal Task Force which is composed of ABA members with expertise in cybersecurity as well as government, technical and private sector representation. The Second Edition of this top selling cybersecurity book is a must read for anyone working in the field including private practice attorneys and associates, in-house counsel, non-profit and government attorneys and others. Since the release of the first edition published in 2013, cybersecurity breaches in law firms have made news headlines and clients are asking questions about lawyers' and firms' security programs. From the massive Panama Papers breach that led to the dissolution of the Mossack Fonseca Law Firm in April 2016 to the WannaCry and Petya Ransomware attacks, the latter that led to the several day work outage at DLA Piper in June 2017, it is imperative that attorneys understan…
Read online: https://lexisdl.com/library/txsll/title/3899456
-
By Rhodes, Jill D. American Bar Association. Third edition. 2018.
This third edition of The ABA Cybersecurity Handbook updates and expands upon the issues raised in the first two editions. The cybersecurity landscape has undergone seismic changes since the publication of the second edition in 2017. The COVID-19 pandemic has brought new levels of technology integration to the practice of law, accompanied by new and expanded cybersecurity risks. Beyond the legal profession, the SolarWinds, Kaseya, and Colonial Pipeline breaches have set new and alarming precedents. Heightened cybersecurity risk worldwide has prompted increased responses from the US federal government and from the international community. Amid these ongoing developments, the Handbook is at your fingertips as a guide to preparing for and responding to cybersecurity threats and incidents. The foundational information it shares will remain relevant even in a changing environment. The recommendations within each chapter, located at the end, provide an easy guide for developing and imple…
URL: https://lexisdl.com/library/txsll/title/3899456
-
By Robinson, Nicholas A. RAND Corporation. 2011.
This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
Read online: https://lexisdl.com/library/txsll/title/680165
-
Latest received: Automatic updates. Aspen Law & Business. c2000-.
The Computer & Internet Lawyer provides action-oriented guidance by nationally known computer lawyers to resolve the problems that face manufacturers, developers, distributors, and users of computer, telecommunication and online products and services.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=253711141
-
By Bergman, Paul. Nolo. Eighteenth edition. 2024.
"In plain English, [this book] covers: search and seizure, drunk driving, arrests, booking and bail, public defenders, arraignment, lineups, preliminary hearings, trials, plea bargains, common defenses, evidence, sentencing, appeals."--Page [4] of cover.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=lir&jid=NE6O&site=lirc-live
-
By Cwik, Cynthia H. American Bar Association. 1;2019-05. 2019.
The Internet of Things encompasses the ability to connect and direct almost any kind of mechanical system, whether it's automotive, medical, residential, or critical infrastructure. IoT technologies hold tremendous promise for our communities by making them safer and more efficient. As with any other technology, they also entail security risk, and the risks associated with IoT technologies must be aggressively managed. We can do so, with industry's help, by working to leverage standards and liability and insurance mechanisms to ensure that IoT's foundational building blocks are secure and effective. Increasingly, utilities are deploying smart grid technologies, wirelessly connecting thermostats to the utility to measure usage patterns and allow energy supplies to be adjusted, with precision based on need. Companies are working on clocks, kitchen appliances, and other household products that monitor consumer behavior to turn on your coffee machine moments before you wake up; warn you wh…
Read online: http://lexisdl.com/library/txsll/title/4742306
-
By Branham, Lynn S. West Academic Publishing. Eleventh edition. 2022.
"An excellent reference tool, this book explores a range of sentencing-related topics, including the principal purposes of criminal sentences, restorative justice, guilty pleas and plea bargaining, different ways to structure sentencing systems, procedural rights during sentencing proceedings, sentencing evidence, community-based sentences, the death penalty, Eighth Amendment constraints on sentences in noncapital cases, parole release, probation and parole revocation, and enmeshed penalties (often called the “collateral consequences” of a conviction). The latter half of the book contains an illuminating overview of the constitutional rights of incarcerated people, details on litigating their civil-rights suits challenging conditions of confinement and their treatment while incarcerated, and the remedies available to them." - publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27973
-
By Alexander, Kern. West Academic Publishing. Seventh edition. 2022.
"This text captures the key points of the precedents governing student rights and responsibilities relating to attendance, speech, expression, religion, discipline, grades, tests, drugs, search and seizure, the emerging law of social media, i.e., cyberbullying, and the range of procedural due process interests. The book further addresses the range of constitutional rights and protections for teachers as well as employment terms and conditions, including contracts, tenure and potential liabilities." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27791
-
By Rose, Rachel V. American Bar Association. 1;1. 2015.
As part of the “What Is” series, the purpose is to provide a preliminary overview of HIPAA and the HITECH Act in relation to correlating international laws in some strategic countries, as well as providing practical guidance for evaluating business associates and executing business associate agreements. Three countries in particular will be highlighted: the U.S., the U.K. and India. This gives a perspective on the U.S. laws in relation to an established market and an emerging market, whose laws and their enforcement vary widely.
Read online: http://lexisdl.com/library/txsll/title/2393276