Cyber Litigation: The Legal Principles

دانلود کتاب Cyber Litigation: The Legal Principles

44000 تومان موجود

کتاب دعاوی سایبری: اصول حقوقی نسخه زبان اصلی

دانلود کتاب دعاوی سایبری: اصول حقوقی بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 9


توضیحاتی در مورد کتاب Cyber Litigation: The Legal Principles

نام کتاب : Cyber Litigation: The Legal Principles
عنوان ترجمه شده به فارسی : دعاوی سایبری: اصول حقوقی
سری :
نویسندگان : , ,
ناشر : Bloomsbury Professional
سال نشر : 2021
تعداد صفحات : 435
ISBN (شابک) : 9781526513595 , 9781526513618
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 6 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface\nTable of statutes\nTable of statutory instruments\nTable of cases\nPART I Introduction\n Chapter 1: What is Cyber Litigation?\n What is cyber litigation?\n What are the technologies that affect litigation?\n What areas of society are affected by cyber litigation?\n What are the current areas of cyber litigation?\n Cyber litigation in practice\nPART II Causes of Action\n Chapter 2: Cyber Litigation and Criminal Law\n Introduction\n Cyber-enabled or cyber-assisted?\n What cyber-assisted crimes is technology giving rise to?\n Domestic violence and domestic abuse\n Harassment and public order\n Voyeurism\n Indecent photographs and prohibited images of children, and extreme pornographic images\n Financial crime: fraud, bribery and corruption, money laundering, terrorist financing and financial sanctions\n Illicit items\n Theft\n Blackmail\n Trade sanctions and export controls\n Murder and grievous bodily harm\n What are the cyber-dependent crimes?\n Ransomware, malware, spyware etc\n Distributed denial-of-service\n Cybercrime-as-a-service\n What is technology doing to criminal investigations and the criminal justice system?\n Investigations\n Evidence\n Decision making\n Chapter 3: Cyber Litigation and Civil Law\n Cybersecurity\n Contract and tort\n Other sources of cybersecurity law\n The regulation of online content\n Age Appropriate Design Code\n Online Harms White Paper\n Select Committee Report on Immersive and Addictive Technologies\n Particular types of online harm\n Excessive screen time\n Problem gaming\n Online age ratings\n ‘Loot boxes’ and in-game purchases\n E-sports\n Development of automated vehicles\n The policy context\n Testing of automated vehicles\n The legal issues\n Artificial intelligence and databases\n Financial technology\n Algorithmic trading\n Crowdfunding\n Cryptoassets and smart contracts\n Definitions and characteristics\n Cryptoasset regulation\n Smart contracts\n Chapter 4: Causes of Action in Data Protection Law\n Introductory\n General Data Protection Regulation\n Supervisory authorities\n Scope and boundaries of data protection law\n Territorial scope\n The application of the GDPR\n The role of the DPA 2018\n Terminology and definitions\n Personal data\n Processing\n Controller\n Processor\n Consent\n Special categories of personal data\n Profiling\n Filing system\n Pseudonymisation\n Data protection principles\n (a) ‘Personal data shall be processed fairly and lawfully and in a transparent manner’\n (b) ‘Personal data shall be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes …’\n (c) ‘Personal data shall be adequate, relevant and limited to what is necessary in relation to the purposes for which it is processed’\n (d) ‘Personal data shall be accurate and, where necessary kept up to date. Every reasonable step must be taken to ensure that personal data that is inaccurate, having regard to the purposes for which it is processed, is erased or rectified without dela\n (e) ‘Personal data shall be kept in a form which permits identification of the data subjects for no longer than is necessary for the purposes for which it is processed …’\n (f) ‘Personal data shall be processed in a manner that ensures appropriate security of the personal data …’\n Accountability\n Controller to processor contracts\n Notification and registration requirements\n Other accountability measures\n Data subject rights\n Rights of transparency and information\n Subject access requests\n The right of rectification\n The right of erasure and the right to be forgotten\n Right to restriction of processing\n Data portability\n Right to object, and automated decision-making\n Data security and personal data breaches\nPART III Litigation and Evidence\n Chapter 5: Jurisdiction\n Introduction\n What are the general rules on jurisdiction in cyber litigation?\n How can the general rules on jurisdiction be amended?\n What are the particular areas of cyber litigation that have specific jurisdictional considerations?\n New Court List and Pre-Action Protocol for Data Claims\n Privacy Shield\n How will the rules on jurisdiction be impacted by Brexit?\n Chapter 6: Class Actions\n Introduction\n Group Actions in England and Wales\n Consolidation of claims and multiparty litigation\n Representative parties\n Group Litigation Orders\n Group Actions in cyber cases\n GLOs\n Representative actions\n The future of group actions in cyber litigation\n A new attitude from the courts?\n Loss of control extended?\n A growth in Group Actions?\n Chapter 7: Vicarious Liability\n Introduction\n Vicarious liability\n The Mohamud case\n The Morrisons case\n Vicarious liability and cyber litigation\n What can companies and corporates do to protect themselves?\n Chapter 8: Evidential Considerations\n Introduction\n What are the specific challenges in evidence gathering in cyber litigation?\n Lawfully obtaining electronic material\n Privacy\n Evidence abroad\n What are the specific evidential challenges once material has been obtained?\n Maintaining the integrity of material\n Accessibility of material\n Admissibility of material\n Retention of material\nPART IV Remedies and Alternatives to Litigation\n Chapter 9: Remedies\n Introduction\n What criminal remedies are likely to be seen in criminal ‘cyber’ cases?\n Restraint and confiscation orders\n What civil remedies are being seen in civil ‘cyber’ cases?\n Injunctions\n Legal considerations\n Practical considerations\n Contract law remedies\n What remedies are provided by ‘regulators’ in ‘cyber’ cases?\n Notice and take down requests\n Information Commissioner’s Office\n Should the courts and regulators develop new remedies for cyber litigation?\n Chapter 10: Alternatives to Litigation\n Introduction\n What are the alternatives to criminal prosecutions in ‘cyber’ cases?\n National Cyber Crime Unit’s Prevent programme\n Serious Crime Prevention Orders\n Deferred Prosecution Agreements\n Civil recovery\n Criminal taxation\n What are the alternatives to civil actions in ‘cyber’ cases?\n ‘Cyber’ disputes being resolved by alternative dispute resolution\n Information security in alternative dispute resolution procedures: the 2020 Cybersecurity Protocol for International Arbitration\n How are ordinary disputes being resolved by ‘cyber’ and technology?\n Online dispute resolution\n Alternatives to traditional dispute resolution\n Index




پست ها تصادفی