Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
How to Get These Books
Books in print:
The books listed here are all held by the University of South Carolina Law Library.
Click on a title to see whether the book is currently available or checked out, and where in the law library it can be found.
Learn more about what the UofSC Law Library offers, if you are a:
E-books in the law library:
Anyone may use one of the hardwired desktop public-access computers inside the law library to click the title of an e-book, then click the link in the center of the screen that says "Connect to..." the publisher, and select the School of Law from the list of choices.
Only current UofSC students, faculty, and staff may use their Network ID and password to access an e-book using any computer or device, from anywhere. First, click the title of the book, then click the link in the center of the screen that says "Connect to..." the publisher, and select the School of Law from the list of choices. Then you may be asked for your Network ID and password.
2020 Books on Cybersecurity
America Votes! by
Publication Date: 2020-11-07
This fourth edition addresses numerous electoral issues, including cybersecurity threats.
2018-2019 Books on Cybersecurity
The ABA Cybersecurity Handbook by
Publication Date: 2019-04-09
- Written to enable private practice attorneys, in-house counsel, non-profit and government attorneys to identify potential cybersecurity risks and prepare them to respond in the event of an attack
- Includes a chapter on technology basics
- Addresses ethical issues and special considerations for law firms of all sizes
- Includes the most recent ABA Ethics Opinions
- Illustrates how you should approach the subject of cybersecurity threats and issues with clients
- Discusses when and how to purchase and use cyberinsurance
Cybersecurity for the Home and Office by
Publication Date: 2018-09-07
Written to make it easier for individuals to understand cyber risks so a decision can be made as to where to set the "cybersecurity dial" in home and office.
Publication Date: 2015, latest supplement November 2019
- Federal Trade Commission authority to regulate "unfair" or "deceptive" trade practices
- SEC guidance requiring disclosure of cybersecurity risks
- Sector-specific regulation, such as healthcare, energy, and transportation
- Impact of the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act
- Explanation of the National Institute of Standards and Technology (NIST) Cybersecurity Framework
- Views of the US Secret Service on effective information-sharing
- Guidance of leading consultants about steps to prepare for cybersecurity incidents
- Insurance's evolving role in protecting companies from the financial losses associated with a successful cyber breach
- Elements of effective incident response.
Practice tools include checklists, an overview of the legal consequences of a breach, and a tabletop exercise.
Cybersecurity and Privacy Law in a Nutshell by
Publication Date: 2019-05-20
- An overview of cybersecurity law and policy
- Presents case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind
Fintech Law in a Nutshell by
Publication Date: 2019-11-18
Novel issues for cybersecurity and regulatory compliance are created by new innovations, from cryptocurrencies to marketplace lending, robo-advising, and mobile payments. This Nutshell provides an overview of some key developments reshaping finance--and the rules deployed to oversee them.
2016-2017 Books on Cybersecurity
Cybersecurity Law by
Publication Date: 2017-02-28
- Outlines the legal requirements for data security, emphasizing companies' compliance obligations
- Addresses current U.S. and international laws, regulations, and court opinions that define the field of cybersecurity, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, the Digital Millennium Copyright Act, and the Federal Trade Commission's cybersecurity cases
- Discusses cybersecurity requirements of the largest U.S. trading partners in Europe, Asia, and Latin America, and specifically addresses how these requirements are similar to (and differ from) those in the U.S.
- Examines government surveillance laws and privacy laws that affect cybersecurity as well as each of the data breach notification laws in 47 states and the District of Columbia
- Includes case studies and examples throughout
Encryption Made Simple for Lawyers by
Publication Date: 2016-01-07
- The basics and history of encryption
- The ethics of encrypting confidential information
- A layperson's view of encrypting technology
- Easy to use options for encrypting data on devices like laptops, tablets, and smartphones
- Encrypting data on the go (including wireless and cloud technologies)
- Predictions for the future evolution of encryption
How to Measure Anything in Cybersecurity Risk by
Publication Date: 2016-07-05
Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. In short, this book is a guide to more robust data protection through better quantitative processes, approaches, and techniques.
- Discover the shortcomings of cybersecurity's "best practices"
- Learn which risk management approaches actually create risk
- Improve your current practices with practical alterations
- Learn which methods are beyond saving, and worse than doing nothing
- Inspire a closer examination of your company's own risk management practices in the context of cybersecurity.
International Cybersecurity and Privacy Law in Practice by
Publication Date: 2017-12-04
- Written for lawyers who must advise on strategic implementation of new technologies and the impact of certain laws to the enterprise, interpret complex cybersecurity and privacy contractual language, and participate in incident response and data breach activities
- Written for compliance and security personnel, who need a reference exploring privacy and data protection laws and their connection with security technologies
- Covers regulations and applicable "soft law" including the EU's Global Data Protection Regulation (GDPR), China's Cybersecurity Law, the OECD and APEC Guidelines, and the US Health Insurance Portability and Accountability Act (HIPAA)
Introduces a legal approach to creating and managing an effective cybersecurity and privacy program that includes prompt, secure ways to identify threats, manage vulnerabilities, and respond to "incidents"
Law Firm Cybersecurity by
Publication Date: 2017-12-07
Discusses how law firms can reduce the risk of a data breach, and mitigate the impact of an incident, through a variety of means, including:
- investing in cybersecurity tools
- hiring internal and external cyber resources to augment the firm's current information security practices
- changing the firm's culture to be more security conscious
- cyber insurance, to help mitigate the direct costs of a breach
Locked Down by
Publication Date: 2016-08-07
- Explains information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget
- Written in clear, non-technical language that any lawyer can understand
- Covers email, passwords, laptops, smartphones, wired and wireless networks, server rooms, cleaning crews, alarm systems, equipment disposal
- Helps lawyers develop an information security checklist for their firm
- Guides lawyers in how to investigate, contain, and recover from a security breach
The Manager's Guide to Cybersecurity Law by
Publication Date: 2017-02-01
This e-book is intended to provide technical experts who are building and maintaining cybersecurity programs in companies with a practical understanding of cybersecurity law, in order to:
- Understand the legal duty to act reasonably and responsibly to protect assets and information
- Identify which cybersecurity laws have the potential to impact a cybersecurity program
- Upgrade cybersecurity policies to comply with state, federal, and regulatory statutes
- Communicate effectively about cybersecurity law with corporate legal department and counsel
- Understand the implications of emerging legislation on a cybersecurity program
- Know how to avoid losing a cybersecurity court case on procedure, and develop strategies to handle a dispute out of court
- Develop an international view of cybersecurity and data privacy - and international legal frameworks