This Week in the Law Library ... October 13, 2025
This week the Law Library hopes you have a safe and restful fall break!
Fall Break Circulation Hours
Oct. 13 - 17, 2025
- Monday - Friday: 9:00am - 5:00pm
October Is National Cybersecurity Awareness Month
In honor of Cybersecurity month, this week's featured resources relate to cybersecurity and the law.
Featured Study Aids
- Cybersecurity and Privacy Law in a Nutshell
- Available online via the West Academic study aid subscription, this study aid provides a comprehensive and up-to-date overview of cybersecurity law and policy. Cybersecurity is a serious concern in our lives. It affects individuals, governments, the military, big businesses, small businesses, and law firms themselves. Cybersecurity policy issues implicate both private and public international law, in addition to domestic law. In this Nutshell, we present case law, federal, state and international legislation, administrative actions and regulations, and relevant policy considerations that attorneys and their clients should keep in mind, whether they are working on a case about cybersecurity or just wanting to know more about cybersecurity and privacy in the Internet age.
- Principles of Cybersecurity Law
- Available online via the West Academic study aid subscription, this book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity's business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO's technical cybersecurity issues and how they fit into today's cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any discussion on cybersecurity is the Confidentiality, Integrity, and Availability (CIA) of data. Learn how to implement policy-based "reasonable security measures" frameworks for your organization that form a legal defense to cybersecurity-based actions brought by U.S. agencies such as the Federal Trade Commission (FTC) and state Attorney Generals. A high-level discussion of the National Institute of Science and Technology (NIST) cybersecurity frameworks is included as well as data breach laws, ransomware, anti-hacking related laws and some international issues.
- Global Internet Law
- Available online via the West Academic study aid subscription, this book provides law students with a comprehensive examination of the latest case law and statutory developments. Each chapter is a detailed examination of cases, statutes, industry standards, norms, as well as leading academic commentaries. While the emphasis is on U.S. developments, each chapter compares U.S. to EU regulations, directives, and conventions, as well as other cross-border Internet law developments from diverse legal systems around the world. This Hornbook comprehensively examines Internet technologies, Internet governance, private international law (jurisdiction, choice of law, forum selection and enforcement of judgment), online contacts (mass market, cloud computing service level agreements, social media terms of use software licensing, and e-commerce terms of service), global consumer protection in cyberspace (FTC, state and foreign developments), global Internet torts (including CDA Section 230 developments, Internet security, information torts, and negligent enablement), Internet-related privacy (including the EU Data Directive) global cybercrimes (including state, federal and international developments), privacy (including extensive coverage of The General Data Protection Regulation and the Right To Be Forgotten), content regulations (U.S. vs. European Union), copyrights in cyberspace, trademarks and domain names, Internet-related trade secrets and patent law developments.
Featured Database
- Bloomberg Law Privacy & Data Security Practice Center
- This practice center includes curated practice pages for International Resources, Federal Resources, State Resources, Data Breach, Digital Privacy, Consumer Privacy, Health Data Privacy, Financial Data Privacy, Workplace Privacy, and News. Secondary source coverage includes the Bloomberg BNA Privacy & Data Security Practice Portfolio Series and treatises from Bloomberg BNA and other publishers. You can also view data & privacy security country profiles for 65 jurisdictions and domestic profiles for all 50 states and D.C. The Practical Guidance covers topics such as Cyber Insurance, Cross-Border Data Transfers, and GDPR Compliance. It also includes practitioner tools such as State and International Chart Builders, Trackers (CCPA, state, GDPR), and In Focus pages on hot-button issues such as Schrems II,CCPA, and GDPR. Primary source coverage includes privacy and data security laws and regulations (U.S. and international), state and federal court opinions, federal agency materials, and federal legislation.
Featured Guide
- College of Law IT Support: Information Security page
- This guide provides information on IT support at the College of Law and includes a page on information security.
Featured Treatise
- Computer Law: A Guide to Cyberlaw and Data Privacy Law
- Available on Lexis, this treatise provides extensive coverage of US and international privacy and data protection, electronic discovery, electronic evidence, and US and international software protection. Computer Law discusses: the privacy and data protection laws of the United States, the states, the European Union, and many other foreign nations; application of the discovery rules to electronic records and other electronic documents; how to introduce or oppose the admission of electronic evidence, and how to attack or buttress the probative value of this evidence; U.S. and international methods of protecting software through the use of copyright, trade secrets, patents, and contracts; and the technical basics of computer software and hardware, explained on a level you can understand.
Featured Videos
- CISA Webinars via YouTube
- View the Cybersecurity & Infrastructure Security Agency's videos on cybersecurity.
Featured Website
- CISA is the National Coordinator for Critical Infrastructure Security and Resilience. They work with partners at every level to identify and manage risk to the cyber and physical infrastructure.
Learn More About Cybersecurity
- Data Privacy and Cybersecurity Compliance for Corporations and Their Counsel
- Available on Lexis, this treatise is a unique, comprehensive compendium of both data privacy and cybersecurity law. It delivers detailed, practical compliance guidance for corporations and their lawyers
- Data Privacy and Cybersecurity Law: A Compliance Guide for U.S. Federal, State and Local Governments
- Available on Lexis, this guide combines a comprehensive legal overview with practical, actionable insights applicable to the various governmental levels—federal, state, and local. The guide offers an accessible and thorough examination of data privacy and cybersecurity laws affecting government operations. It presents full coverage of the federal statutory landscape, including key regulations and significant enforcement mechanisms. In addition, it provides in-depth analyses of the six most important state statutes, ensuring readers understand the nuances and differences across jurisdictions. The inclusion of select local legislation further enhances the guide's breadth, making it the only single source that offers a complete picture of the legal framework. Beyond its legal exposition, the book is enriched with practical guidance designed to assist government agencies in developing robust compliance policies and conducting effective auditing and risk management. It features sample policies, detailed analysis, and recommendations on how to navigate the complexities of cybersecurity threats and data privacy requirements specific to the public sector.
- Data Security & Privacy Law
- Available on Westlaw, this treatise comprehensively covers data security and privacy issues. It begins by covering the technology of security and privacy, followed by general laws that have application to all industries, and then industry-specific legislation. Discusses federal and state security and privacy statutes, security and privacy litigation, corporate duties, and EU laws.
- Generative AI, Cybersecurity, and Ethics
- Available on Bloomberg Law, this text explains the dual role artificial intelligence plays in both enabling and safeguarding against cyber threats. Chapters explain the principles, advancements, and challenges of specific domains within AI, such as machine learning (ML), deep learning (DL), generative AI, data privacy and protection, the need for ethical and responsible human oversight in AI systems, and more.
- Information Security and Privacy: A Guide to Federal and State Law and Compliance Scope Information
- Available on Westlaw, this edition includes an overview of information security and privacy law in the United States. Failures in these areas can lead to enforcement actions, bad publicity and class action lawsuits. Given the moving target that these laws present many companies face significant compliance hurdles.
October Is National Domestic Violence Awareness Month
October is National Domestic Violence Awareness Month. Begun in 1981 by the National Coalition Against Domestic Violence, it is a Day of Unity to connect battered women’s advocates across the country. In 1989 Congress passed Public Law 101-112 declaring the month of October to be Domestic Violence Awareness Month. This month's theme is "With Survivors, Always."
More Resources for Domestic Violence Awareness
- Domestic Violence Law (hornbook)
- Available via the West Academic study aid subscription and at Law Stacks KF9322 .W457 2019, this Hornbook provides an overview of all aspects of state and federal law on domestic violence: the nature of domestic violence, the role of influential factors, special contexts, the full range of abuse, law enforcement response, the Violence Against Women Act, criminal law defenses, evidentiary issues, orders of protection, tort remedies, firearm regulations, tribal law issues, family law issues, child welfare overlap, immigration law issues, discrimination against victims, and more.
- Domestic Violence Practice and Procedure
- Available on Westlaw and at Law Stacks KF 1269 .L44, this text helps both prosecutors and defense attorneys construct winning cases. It offers analysis of scientific and medical information, practical advice, proven tips, domestic violence caselaw and statutes. It also discusses commonly encountered clients, jurors, and attitudes; the full spectrum of physical and psychological injuries; obtaining evidence, and determining civil causes of action; analysis of federal and state law; how to gauge the value of expert testimony and the process of litigating cases; a comparison of prosecution and defense strategies; and more.
- Handling Child Custody, Abuse & Adoption Cases
- Available on Westlaw, this text combines coverage of the law with trial strategies and hands-on practice tools. A respected certified domestic relations specialist discusses a full range of crucial topics, such as: proving abuse, terminating parental rights, strategies for interviewing children, and more.
- Ohio Domestic Violence Law
- Available on Westlaw and at Law Ohio KFO567.F35 A295, Ohio Domestic Violence Law (Baldwin's Ohio Handbook Series) is a practical guide for attorneys and non-attorneys, presenting detailed analysis of Ohio's criminal and civil domestic violence statutes.
- Expert Testimony on Domestic Violence : A Discourse Analysis
- Available at Law Stacks KF8968.7 .H36 2009, this text examines the impact of social science evidence on legal reasoning in domestic violence cases. Relying on interdisciplinary theories and methodologies in law, the author analyzes the text and rhetoric from a body of appellate opinions in which expert witnesses provided social science-based testimony about domestic violence. Expert testimony was highly influential on, yet was rarely challenged by, the appellate judges. From this body of judicial writings, the author uncovers typologies and also notes the discursive tension in the judicial opinions in the cases in which the common typologies did not apply well to the specific defendants, victims, or their circumstances based on the factual evidence in the underlying trials.
Posted Oct. 13, 2025 by Susan Boland