SlideShare uma empresa Scribd logo
1 de 15
Principles of Information Security,
Fifth Edition
Chapter 3
Legal, Ethical, and Professional
Issues in Information Security
Lesson 1 – Laws and Ethics
Learning Objectives
• Upon completion of this material, you should be
able to:
– Describe the functions of and relationships among
laws, regulations, and professional organizations in
information security
– Explain the differences between laws and ethics
Principles of Information Security, Fifth Edition 2
Introduction
• You must understand the scope of an
organization’s legal and ethical responsibilities.
• To minimize liabilities/reduce risks, the information
security practitioner must:
– Understand the current legal environment
– Stay current with laws and regulations
– Watch for new and emerging issues
Principles of Information Security, Fifth Edition 3
Law and Ethics in Information Security
• Laws: rules that mandate or prohibit certain
behavior and are enforced by the state
• Ethics: regulate and define socially acceptable
behavior
• Cultural mores: fixed moral attitudes or customs of
a particular group
• Laws carry the authority of a governing authority;
ethics do not.
Principles of Information Security, Fifth Edition 4
Organizational Liability and the Need
for Counsel
• Liability: the legal obligation of an entity extending
beyond criminal or contract law; includes the legal
obligation to make restitution
• Restitution: the legal obligation to compensate an
injured party for wrongs committed
• Due care: the legal standard requiring a prudent
organization to act legally and ethically and know
the consequences of actions
• Due diligence: the legal standard requiring a
prudent organization to maintain the standard of
due care and ensure actions are effective
Principles of Information Security, Fifth Edition 5
Organizational Liability and the Need
for Counsel (cont’d)
• Jurisdiction: court’s right to hear a case if the wrong
was committed in its territory or involved its
citizenry
• Long-arm jurisdiction: application of laws to those
residing outside a court’s normal jurisdiction;
usually granted when a person acts illegally within
the jurisdiction and leaves
Principles of Information Security, Fifth Edition 6
Policy Versus Law
• Policies: managerial directives that specify
acceptable and unacceptable employee behavior in
the workplace
• Policies function as organizational laws; must be
crafted and implemented with care to ensure they
are complete, appropriate, and fairly applied to
everyone
• Difference between policy and law: Ignorance of a
policy is an acceptable defense.
Principles of Information Security, Fifth Edition 7
Policy Versus Law (cont’d)
• Criteria for policy enforcement:
– Dissemination (distribution)
– Review (reading)
– Comprehension (understanding)
– Compliance (agreement)
– Uniform enforcement
Principles of Information Security, Fifth Edition 8
Types of Law
• Civil: governs nation or state; manages
relationships/conflicts between organizations and
people
• Criminal: addresses activities and conduct harmful
to society; actively enforced by the state
• Private: family/commercial/labor law; regulates
relationships between individuals and organizations
• Public: regulates structure/administration of
government agencies and their relationships with
citizens, employees, and other governments
Principles of Information Security, Fifth Edition 9
Relevant U.S. Laws
• The United States has been a leader in the
development and implementation of information
security legislation.
• Information security legislation contributes to a
more reliable business environment and a stable
economy.
• The United States has demonstrated
understanding of the importance of securing
information and has specified penalties for
individuals and organizations that breach civil and
criminal law.
Principles of Information Security, Fifth Edition 10
General Computer Crime Laws
• Computer Fraud and Abuse Act of 1986 (CFA Act):
Cornerstone of many computer-related federal laws and
enforcement efforts
• National Information Infrastructure Protection Act of
1996:
– Modified several sections of the previous act and
increased the penalties for selected crimes
– Severity of the penalties was judged on the value of the
information and the purpose
• For purposes of commercial advantage
• For private financial gain
• In furtherance of a criminal act
Principles of Information Security, Fifth Edition 11
General Computer Crime Laws
(cont’d)
• USA PATRIOT Act of 2001: Provides law
enforcement agencies with broader latitude in order
to combat terrorism-related activities
• USA PATRIOT Improvement and Reauthorization
Act: Made permanent fourteen of the sixteen
expanded powers of the Department of Homeland
Security and the FBI in investigating terrorist activity
• Computer Security Act of 1987: One of the first
attempts to protect federal computer systems by
establishing minimum acceptable security practices.
Principles of Information Security, Fifth Edition 12
Privacy
• One of the hottest topics in information security
• Right of individuals or groups to protect themselves
and personal information from unauthorized access
• Ability to aggregate data from multiple sources
allows creation of information databases previously
impossible
• The number of statutes addressing an individual’s
right to privacy has grown.
Principles of Information Security, Fifth Edition 13
Principles of Information Security, Fifth Edition 14
Privacy (cont’d)
• U.S. Regulations
– Privacy of Customer Information Section of the
common carrier regulation
– Federal Privacy Act of 1974
– Electronic Communications Privacy Act of 1986
– Health Insurance Portability and Accountability Act
of 1996 (HIPAA), aka Kennedy-Kassebaum Act
– Financial Services Modernization Act, or Gramm-
Leach-Bliley Act of 1999
Principles of Information Security, Fifth Edition 15

Mais conteúdo relacionado

Mais procurados

Frame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison UniversityFrame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison Universitytouseefaq3
 
Narcotic drugs & psychotropic substances act,1985 with rules 1985
Narcotic drugs & psychotropic substances act,1985 with rules 1985Narcotic drugs & psychotropic substances act,1985 with rules 1985
Narcotic drugs & psychotropic substances act,1985 with rules 1985Ravikumar Patil
 
difference between law and jurisprudence
difference between law and jurisprudence difference between law and jurisprudence
difference between law and jurisprudence bivekchaudhary4
 
Nature functions and_classification_of_law
Nature functions and_classification_of_lawNature functions and_classification_of_law
Nature functions and_classification_of_lawJaseme_Otoyo
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONFAREED UR RAHMAN .
 
Introduction to law
Introduction to lawIntroduction to law
Introduction to lawAMBETHKAR P
 
Administrative law @ Dal Candra
Administrative law @ Dal CandraAdministrative law @ Dal Candra
Administrative law @ Dal CandraDal Sir
 
Introduction to Jurisprudence
Introduction to JurisprudenceIntroduction to Jurisprudence
Introduction to Jurisprudencecarolineelias239
 
,Pharmacy law & ethics
,Pharmacy law & ethics,Pharmacy law & ethics
,Pharmacy law & ethicsismael akmel
 
Health Screening Services in Community Pharmacy.pdf
Health Screening Services in Community Pharmacy.pdfHealth Screening Services in Community Pharmacy.pdf
Health Screening Services in Community Pharmacy.pdfDr Ravikiran S
 
Hipaa training
Hipaa trainingHipaa training
Hipaa trainingmussell
 
Function of drug store management & coding methods
Function of drug store management & coding methodsFunction of drug store management & coding methods
Function of drug store management & coding methodsDebasish Ghadei
 
Natural law theories
Natural law theoriesNatural law theories
Natural law theoriesFAROUQ
 

Mais procurados (20)

Hosptal pharmacy management
Hosptal pharmacy management Hosptal pharmacy management
Hosptal pharmacy management
 
Frame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison UniversityFrame Work of Employee Relation Law , Lahore Garrison University
Frame Work of Employee Relation Law , Lahore Garrison University
 
Narcotic drugs & psychotropic substances act,1985 with rules 1985
Narcotic drugs & psychotropic substances act,1985 with rules 1985Narcotic drugs & psychotropic substances act,1985 with rules 1985
Narcotic drugs & psychotropic substances act,1985 with rules 1985
 
difference between law and jurisprudence
difference between law and jurisprudence difference between law and jurisprudence
difference between law and jurisprudence
 
IEEE Code of Ethics
IEEE Code of EthicsIEEE Code of Ethics
IEEE Code of Ethics
 
Nature functions and_classification_of_law
Nature functions and_classification_of_lawNature functions and_classification_of_law
Nature functions and_classification_of_law
 
PROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTIONPROFESSIONAL PRACTICES IMPORTANT QUESTION
PROFESSIONAL PRACTICES IMPORTANT QUESTION
 
Legal ethics
Legal ethicsLegal ethics
Legal ethics
 
Introduction to law
Introduction to lawIntroduction to law
Introduction to law
 
Administrative law @ Dal Candra
Administrative law @ Dal CandraAdministrative law @ Dal Candra
Administrative law @ Dal Candra
 
Civil law
Civil lawCivil law
Civil law
 
Introduction to Jurisprudence
Introduction to JurisprudenceIntroduction to Jurisprudence
Introduction to Jurisprudence
 
,Pharmacy law & ethics
,Pharmacy law & ethics,Pharmacy law & ethics
,Pharmacy law & ethics
 
Health Screening Services in Community Pharmacy.pdf
Health Screening Services in Community Pharmacy.pdfHealth Screening Services in Community Pharmacy.pdf
Health Screening Services in Community Pharmacy.pdf
 
The pharmacy act
The pharmacy actThe pharmacy act
The pharmacy act
 
Family Law Basics
Family Law BasicsFamily Law Basics
Family Law Basics
 
Natural Law Theory
Natural Law TheoryNatural Law Theory
Natural Law Theory
 
Hipaa training
Hipaa trainingHipaa training
Hipaa training
 
Function of drug store management & coding methods
Function of drug store management & coding methodsFunction of drug store management & coding methods
Function of drug store management & coding methods
 
Natural law theories
Natural law theoriesNatural law theories
Natural law theories
 

Semelhante a Lesson 1- Laws and Ethics

Chapter 3 - Lesson 1.pptx
Chapter 3 - Lesson 1.pptxChapter 3 - Lesson 1.pptx
Chapter 3 - Lesson 1.pptxJhaiJhai6
 
Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxShruthi48
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxJhaiJhai6
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2MLG College of Learning, Inc
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...Larry Catá Backer
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptAnil Yadav
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptxJohnLagman3
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 

Semelhante a Lesson 1- Laws and Ethics (20)

Chapter 3 - Lesson 1.pptx
Chapter 3 - Lesson 1.pptxChapter 3 - Lesson 1.pptx
Chapter 3 - Lesson 1.pptx
 
Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptx
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptx
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Lesson 2-Identify Theft
Lesson 2-Identify TheftLesson 2-Identify Theft
Lesson 2-Identify Theft
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
4482LawEthics.ppt
4482LawEthics.ppt4482LawEthics.ppt
4482LawEthics.ppt
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
Polycentricity in South Asian Human Rights Law: On the Strategic and Simultan...
 
Chapter3.ppt
Chapter3.pptChapter3.ppt
Chapter3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx3-Professional Ethics Issues.pptx
3-Professional Ethics Issues.pptx
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 

Mais de MLG College of Learning, Inc (20)

PC111.Lesson2
PC111.Lesson2PC111.Lesson2
PC111.Lesson2
 
PC111.Lesson1
PC111.Lesson1PC111.Lesson1
PC111.Lesson1
 
PC111-lesson1.pptx
PC111-lesson1.pptxPC111-lesson1.pptx
PC111-lesson1.pptx
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
PC 106 PPT-09.pptx
PC 106 PPT-09.pptxPC 106 PPT-09.pptx
PC 106 PPT-09.pptx
 
PC 106 PPT-07
PC 106 PPT-07PC 106 PPT-07
PC 106 PPT-07
 
PC 106 PPT-01
PC 106 PPT-01PC 106 PPT-01
PC 106 PPT-01
 
PC 106 PPT-06
PC 106 PPT-06PC 106 PPT-06
PC 106 PPT-06
 
PC 106 PPT-05
PC 106 PPT-05PC 106 PPT-05
PC 106 PPT-05
 
PC 106 Slide 04
PC 106 Slide 04PC 106 Slide 04
PC 106 Slide 04
 
PC 106 Slide no.02
PC 106 Slide no.02PC 106 Slide no.02
PC 106 Slide no.02
 
pc-106-slide-3
pc-106-slide-3pc-106-slide-3
pc-106-slide-3
 
PC 106 Slide 2
PC 106 Slide 2PC 106 Slide 2
PC 106 Slide 2
 
PC 106 Slide 1.pptx
PC 106 Slide 1.pptxPC 106 Slide 1.pptx
PC 106 Slide 1.pptx
 
Db2 characteristics of db ms
Db2 characteristics of db msDb2 characteristics of db ms
Db2 characteristics of db ms
 
Db1 introduction
Db1 introductionDb1 introduction
Db1 introduction
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 
Lesson 3.1
Lesson 3.1Lesson 3.1
Lesson 3.1
 
Lesson 1.6
Lesson 1.6Lesson 1.6
Lesson 1.6
 
Lesson 3.2
Lesson 3.2Lesson 3.2
Lesson 3.2
 

Último

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Último (20)

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Lesson 1- Laws and Ethics

  • 1. Principles of Information Security, Fifth Edition Chapter 3 Legal, Ethical, and Professional Issues in Information Security Lesson 1 – Laws and Ethics
  • 2. Learning Objectives • Upon completion of this material, you should be able to: – Describe the functions of and relationships among laws, regulations, and professional organizations in information security – Explain the differences between laws and ethics Principles of Information Security, Fifth Edition 2
  • 3. Introduction • You must understand the scope of an organization’s legal and ethical responsibilities. • To minimize liabilities/reduce risks, the information security practitioner must: – Understand the current legal environment – Stay current with laws and regulations – Watch for new and emerging issues Principles of Information Security, Fifth Edition 3
  • 4. Law and Ethics in Information Security • Laws: rules that mandate or prohibit certain behavior and are enforced by the state • Ethics: regulate and define socially acceptable behavior • Cultural mores: fixed moral attitudes or customs of a particular group • Laws carry the authority of a governing authority; ethics do not. Principles of Information Security, Fifth Edition 4
  • 5. Organizational Liability and the Need for Counsel • Liability: the legal obligation of an entity extending beyond criminal or contract law; includes the legal obligation to make restitution • Restitution: the legal obligation to compensate an injured party for wrongs committed • Due care: the legal standard requiring a prudent organization to act legally and ethically and know the consequences of actions • Due diligence: the legal standard requiring a prudent organization to maintain the standard of due care and ensure actions are effective Principles of Information Security, Fifth Edition 5
  • 6. Organizational Liability and the Need for Counsel (cont’d) • Jurisdiction: court’s right to hear a case if the wrong was committed in its territory or involved its citizenry • Long-arm jurisdiction: application of laws to those residing outside a court’s normal jurisdiction; usually granted when a person acts illegally within the jurisdiction and leaves Principles of Information Security, Fifth Edition 6
  • 7. Policy Versus Law • Policies: managerial directives that specify acceptable and unacceptable employee behavior in the workplace • Policies function as organizational laws; must be crafted and implemented with care to ensure they are complete, appropriate, and fairly applied to everyone • Difference between policy and law: Ignorance of a policy is an acceptable defense. Principles of Information Security, Fifth Edition 7
  • 8. Policy Versus Law (cont’d) • Criteria for policy enforcement: – Dissemination (distribution) – Review (reading) – Comprehension (understanding) – Compliance (agreement) – Uniform enforcement Principles of Information Security, Fifth Edition 8
  • 9. Types of Law • Civil: governs nation or state; manages relationships/conflicts between organizations and people • Criminal: addresses activities and conduct harmful to society; actively enforced by the state • Private: family/commercial/labor law; regulates relationships between individuals and organizations • Public: regulates structure/administration of government agencies and their relationships with citizens, employees, and other governments Principles of Information Security, Fifth Edition 9
  • 10. Relevant U.S. Laws • The United States has been a leader in the development and implementation of information security legislation. • Information security legislation contributes to a more reliable business environment and a stable economy. • The United States has demonstrated understanding of the importance of securing information and has specified penalties for individuals and organizations that breach civil and criminal law. Principles of Information Security, Fifth Edition 10
  • 11. General Computer Crime Laws • Computer Fraud and Abuse Act of 1986 (CFA Act): Cornerstone of many computer-related federal laws and enforcement efforts • National Information Infrastructure Protection Act of 1996: – Modified several sections of the previous act and increased the penalties for selected crimes – Severity of the penalties was judged on the value of the information and the purpose • For purposes of commercial advantage • For private financial gain • In furtherance of a criminal act Principles of Information Security, Fifth Edition 11
  • 12. General Computer Crime Laws (cont’d) • USA PATRIOT Act of 2001: Provides law enforcement agencies with broader latitude in order to combat terrorism-related activities • USA PATRIOT Improvement and Reauthorization Act: Made permanent fourteen of the sixteen expanded powers of the Department of Homeland Security and the FBI in investigating terrorist activity • Computer Security Act of 1987: One of the first attempts to protect federal computer systems by establishing minimum acceptable security practices. Principles of Information Security, Fifth Edition 12
  • 13. Privacy • One of the hottest topics in information security • Right of individuals or groups to protect themselves and personal information from unauthorized access • Ability to aggregate data from multiple sources allows creation of information databases previously impossible • The number of statutes addressing an individual’s right to privacy has grown. Principles of Information Security, Fifth Edition 13
  • 14. Principles of Information Security, Fifth Edition 14
  • 15. Privacy (cont’d) • U.S. Regulations – Privacy of Customer Information Section of the common carrier regulation – Federal Privacy Act of 1974 – Electronic Communications Privacy Act of 1986 – Health Insurance Portability and Accountability Act of 1996 (HIPAA), aka Kennedy-Kassebaum Act – Financial Services Modernization Act, or Gramm- Leach-Bliley Act of 1999 Principles of Information Security, Fifth Edition 15