丸善雄松堂株式会社
学術情報ソリューション事業部
法律情報営業部

〒160-0002
東京都新宿区四谷坂町10-10
Tel: 03-6367-6120
Fax: 03-6367-6215

※2018年5月7日より電話・Fax番号が変わりました。

ご注文に際して

個人情報保護方針

コーポレートサイト

米国におけるデータプライバシー、保護、セキュリティ法

Data Privacy, Protection, and Security Law

Raymond T. Nimmer, Holly K. Towle

1 vol. Looseleaf., 2012 to date.(追録年2回)

A. S. Pratt (LexisNexis), USA. ISBN: 9780769886039

特価 ¥101,242

在庫あり

米国におけるデータ保護とプライバシー法に関する権威ある解釈を提供。ビジネスプラン上の法的留意点、コンプライアンス実務も解説。

【主なトピック】

データ保護法/eコマースにおけるプライバシー/身元詐称/個人情報のセキュリティと法的論点/違反者の責任/第三者への自発的義務/法的責任/管轄権 他

【Table of Contents】

Chapter 1 Introduction

§ 1.01 Online Informational Privacy and Data Protection

§ 1.02 “Privacy” and “Data Protection”

§ 1.03 Privacy Torts

Chapter 2 Data Protection Laws

§ 2.01 Data Protection Generally

§ 2.02 Data Protection: Required Consent to Third-Party Use of Data

§ 2.03 Data Protection: Data Quality and Accuracy

§ 2.04 Data Protection: Private Party Collection of Data

§ 2.05 Data Protection: International Considerations

§ 2.06 [Reserved]

§ 2.07 Data Protection: Gramm-Leach-Bliley Act

§ 2.08 Children’s Online Privacy Protection Act and State Statutes Regarding Children or Other Minors

Chapter 3 Selected E-Commerce Privacy Issues

§ 3.01 Anonymity and Individual Rights

§ 3.02 Cookies and Transactional Information; Behavioral Advertising, Cross Device Tracking and Beyond

§ 3.03 Social Security Numbers and Similar Data

§ 3.04 Communications Stored or Intercepted; Pretexting and Sale of Confidential Phone Records Information

§ 3.05 Privacy Policies: Content and Risks

§ 3.06 Data Protection and “Right to Know” Law

§ 3.07 Sharing of Information Among Affiliates for Unsolicited Marketing

§ 3.08 Tracking or Identification Technologies

§ 3.09 Genetic or Biometric Information

§ 3.10 Terrorism-Related Laws

§ 3.11 Big Data and Artificial Intelligence

§ 3.12 Inter-Connected Items Data, Including Internet of Things

Chapter 4 Identity Theft

§ 4.01 Introduction

§ 4.02 What Is Identity Theft?

§ 4.03 How Does Identity Theft Happen?

§ 4.04 Who Is an Identity Thief?

§ 4.05 Responses to Identity Theft

§ 4.06 What Laws Address Identity Theft?

§ 4.07 How Can Potential Victims Decrease the Risk of Identity Theft?

Chapter 5 Nature of Security Liability Risk

§ 5.01 Introduction

§ 5.02 Nature of Security Liability Risk

Chapter 6 Personal Data Security and Wrongdoer’s Liability

§ 6.01 Legal Protection of Information and Systems

Chapter 7 Voluntary Obligations to Third Parties

§ 7.01 Contractual Obligations of Data Security

§ 7.02 Privacy Policies and Security Obligations

Chapter 8 Personal Data Security Obligations Imposed in Law

§ 8.01 Federal Law and Policy

§ 8.02 International Law and Policy

§ 8.03 State Laws

§ 8.04 Particular Technologies or Devices

§ 8.05 Sarbanes-Oxley Issues

§ 8.06 Transactional Issues

§ 8.07 Disposal of Data

Chapter 9 Other Data Security

§ 9.01 Entity Data