SlideShare a Scribd company logo
1 of 12
Key U.S. Laws of Interest
 to Information Security
       Professionals


      BY : -
      Shivani Gamit (Student@SCIT_2011-13)
• Act – Communications Act of 1934, updated
  by Telecommunications Deregulation and
  Competition Act of 1996
• Subject – Telecommunications
• Year – 1934 (amended 1996 and 2001)
• Description – Regulates interstate and foreign
  telecommunications
• Act – Computer Fraud and Abuse Act (also
  known as Fraud and Related Activity in
  Connection with Computers)
• Subject – Threats to computers
• Year – 1986 (amended 1994,1996 and 2001)
• Description – Defines and formalizes laws to
  counter threats from computer related acts
  and offenses
• Act – Computer Security Act
• Subject – Federal Agency of Information
  Security
• Year – 1987
• Description – Requires all federal computer
  systems that contain classified information to
  have surety plans in place, and requires
  periodic security training for all individuals
  who operate, design, or manage such systems
•   Act – Economic Espionage
•   Subject – Trade secrets
•   Year – 1996
•   Description – Designed to prevent abuse of
    information gained by an individual working in
    one company and employed by another
•   Act – Federal Privacy Act
•   Subject – Privacy
•   Year – 1974
•   Description – Governs federal agency use of
    personal information
• Act – Gramm-Leach-Bliley Act (GLB) or
  Financial Services Modernization Act
• Subject – Banking
• Year – 1999
• Description – Focuses on facilitating affiliation
  among banks, insurance, and securities firm; it
  has significant impact on the privacy of
  personal information used by these industries
• Act – Health Insurance Portability and
  Accountability Act (HIPAA)
• Subject – Health care privacy
• Year – 1996
• Description – Regulates collection, storage,
  and transmission of sensitive personal health
  care information
•   Act – Sarbanes-Oxley Act
•   Subject – Financial Reporting
•   Year – 2002
•   Description – Affects how public organizations
    and accounting firms deal with corporate
    governance, financial disclosure, and the
    practice of public accounting
• Act – Security and Freedom through
  Encryption Act
• Subject – Use and sale of software that uses
  or enables encryption
• Year – 1999
• Description – Clarifies use of encryption for
  people in the USA and permits all person in
  the U.S. to buy or sell any encryption product
  and states that the government cannot
  require the use of any kind of key escrow
  system for encryption product
• Act – USA PATRIOT Improvement and
  Reauthorization Act
• Subject – Terrorism
• Year – 2006
• Description – Made permanent 14 of the 16
  expanded powers of the department of
  Homeland Security and the FBI in investigating
  terrorist activity
Thank You

More Related Content

What's hot (8)

Final ppt on juvenile crime
Final ppt on juvenile crimeFinal ppt on juvenile crime
Final ppt on juvenile crime
 
Theories of Crime Causation.pptx
Theories of Crime Causation.pptxTheories of Crime Causation.pptx
Theories of Crime Causation.pptx
 
Ramon magsaysay administration
Ramon magsaysay administrationRamon magsaysay administration
Ramon magsaysay administration
 
A presentation on child pornography
A presentation on child pornographyA presentation on child pornography
A presentation on child pornography
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
Wilson & Kelling's "Broken Windows" Analysis - C Strayer
Wilson & Kelling's "Broken Windows" Analysis - C StrayerWilson & Kelling's "Broken Windows" Analysis - C Strayer
Wilson & Kelling's "Broken Windows" Analysis - C Strayer
 
Final presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot ActFinal presentation rev 1 - USA Patriot Act
Final presentation rev 1 - USA Patriot Act
 
Juvenile Deliquency In India
Juvenile Deliquency In IndiaJuvenile Deliquency In India
Juvenile Deliquency In India
 

Similar to Laws of interest to security professionals

Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 

Similar to Laws of interest to security professionals (20)

Legal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptxLegal-Ethical-Professionalin-IS.pptx
Legal-Ethical-Professionalin-IS.pptx
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
ethcpp04-Unit 3.ppt
ethcpp04-Unit 3.pptethcpp04-Unit 3.ppt
ethcpp04-Unit 3.ppt
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
Privacy And Surveillance
Privacy And SurveillancePrivacy And Surveillance
Privacy And Surveillance
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Lesson 2-Identify Theft
Lesson 2-Identify TheftLesson 2-Identify Theft
Lesson 2-Identify Theft
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptx
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Lesson-13_IT-REPORT.pptx. Information technology
Lesson-13_IT-REPORT.pptx. Information technologyLesson-13_IT-REPORT.pptx. Information technology
Lesson-13_IT-REPORT.pptx. Information technology
 
The Laws Every Homeowner Should Know
The Laws Every Homeowner Should KnowThe Laws Every Homeowner Should Know
The Laws Every Homeowner Should Know
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 

Recently uploaded

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Laws of interest to security professionals

  • 1. Key U.S. Laws of Interest to Information Security Professionals BY : - Shivani Gamit (Student@SCIT_2011-13)
  • 2. • Act – Communications Act of 1934, updated by Telecommunications Deregulation and Competition Act of 1996 • Subject – Telecommunications • Year – 1934 (amended 1996 and 2001) • Description – Regulates interstate and foreign telecommunications
  • 3. • Act – Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers) • Subject – Threats to computers • Year – 1986 (amended 1994,1996 and 2001) • Description – Defines and formalizes laws to counter threats from computer related acts and offenses
  • 4. • Act – Computer Security Act • Subject – Federal Agency of Information Security • Year – 1987 • Description – Requires all federal computer systems that contain classified information to have surety plans in place, and requires periodic security training for all individuals who operate, design, or manage such systems
  • 5. Act – Economic Espionage • Subject – Trade secrets • Year – 1996 • Description – Designed to prevent abuse of information gained by an individual working in one company and employed by another
  • 6. Act – Federal Privacy Act • Subject – Privacy • Year – 1974 • Description – Governs federal agency use of personal information
  • 7. • Act – Gramm-Leach-Bliley Act (GLB) or Financial Services Modernization Act • Subject – Banking • Year – 1999 • Description – Focuses on facilitating affiliation among banks, insurance, and securities firm; it has significant impact on the privacy of personal information used by these industries
  • 8. • Act – Health Insurance Portability and Accountability Act (HIPAA) • Subject – Health care privacy • Year – 1996 • Description – Regulates collection, storage, and transmission of sensitive personal health care information
  • 9. Act – Sarbanes-Oxley Act • Subject – Financial Reporting • Year – 2002 • Description – Affects how public organizations and accounting firms deal with corporate governance, financial disclosure, and the practice of public accounting
  • 10. • Act – Security and Freedom through Encryption Act • Subject – Use and sale of software that uses or enables encryption • Year – 1999 • Description – Clarifies use of encryption for people in the USA and permits all person in the U.S. to buy or sell any encryption product and states that the government cannot require the use of any kind of key escrow system for encryption product
  • 11. • Act – USA PATRIOT Improvement and Reauthorization Act • Subject – Terrorism • Year – 2006 • Description – Made permanent 14 of the 16 expanded powers of the department of Homeland Security and the FBI in investigating terrorist activity