𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security litigation : best practices for managing and preventing security-related lawsuits

✍ Scribed by Sorrells, Eddie


Publisher
Butterworth-Heinemann/Elsevier
Year
2016
Tongue
English
Leaves
194
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Security Litigation: Best Practices for Managing and Preventing Security-Related Lawsuits provides practical guidance and examples on how to deal with the most difficult legal issues that security executives face every day, also exploring the key issues that occur before, during, and after a lawsuit.

The book demonstrates scenarios that have actually played out in courtrooms, depositions, and contractual negotiations, and provides answers to challenging security litigation questions such as, What does this contractual provision mean if we get sued? Am I in legal trouble if I assign unarmed vs. armed officers and a crime occurs? How do I defend my company without blaming my customer?

Increasingly, issues such as security surveys, contractual indemnification, and even marketing language are at the center of lawsuits concerning security practices. Many organizations face security-related lawsuits on an increasing basis, and this book provides a much needed resource to help security professionals successfully navigate the unique nature of security-related lawsuits.

Accessibly written for those without a law background, the book assists readers through education, awareness, sample contract language, and assessment templates, offering meaningful recommendations and solutions.

  • Presents practical guidelines for security professionals involved in the prevention of security-related lawsuits
  • Demonstrates how to address real world problems not always found in case law or rules of evidence
  • Provides a much needed resource to help security professionals successfully navigate the unique nature of security-related lawsuits
  • Offers learning aids such as sample documents and graphs that illustarte common liability issues, along with documents from actual cases

✦ Table of Contents


Content:
Front matter,Copyright,Dedication,IntroductionEntitled to full textChapter 1 - The contract security triangle (the company, the customers, and the plaintiffs), Pages 1-8
Chapter 2 - Who is the DECIDER? Risk assessments, industry standards, and operating procedures, Pages 9-30
Chapter 3 - Sign here please: rules of legal engagement, Pages 31-66
Chapter 4 - You’ve been served: are we in this together?, Pages 67-85
Chapter 5 - The adventure of discovery for a contract security company, Pages 87-109
Chapter 6 - Trial survival, Pages 111-132
Chapter 7 - Case closed: where do I go from here?, Pages 133-146
Appendices, Pages 147-185
Subject Index, Pages 187-190


πŸ“œ SIMILAR VOLUMES


Professional practice in crime preventio
✍ Prenzler, Tim πŸ“‚ Library πŸ“… 2014 πŸ› Australian Academic Press 🌐 English

Now more than ever, we need sophisticated government and corporate crime prevention policies that produce results. This book of research, policy and practice provides a clear and up-to-date guide to what works and what constitutes best practice across a range of crime prevention and security managem

Defensive Security Handbook: Best Practi
✍ Lee Brotherston; Amanda Berlin πŸ“‚ Library πŸ› O'Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro

Defensive Security Handbook: Best Practi
✍ Lee Brotherston, Amanda Berlin πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide pro

Defensive Security Handbook: Best Practi
✍ Amanda Berlin, Lee Brotherston, William Reyor III πŸ“‚ Library πŸ“… 2024 πŸ› O'Reilly Media 🌐 English

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handboo

Defensive Security Handbook: Best Practi
✍ Lee Brotherston, Amanda Berlin πŸ“‚ Library πŸ“… 2017 πŸ› O’Reilly Media 🌐 English

<div><p>Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic g