SlideShare uma empresa Scribd logo
1 de 35
Implications of Acts in
Organizations
Deepak . S
Kasturi Pal
Mervin.S
Sudhanshu cyril
Swarupa rani sahu
HIPAA
Health Insurance Portability and
Accountability Act
What is HIPAA?
• The Health Insurance Portability and Accountability
  Act enacted by the U.S. Congress
• Uses electronically exchangeable data to effectively
  help in healthcare
• Standards are used to monitor confidentiality and
  security of the patient data
What information is covered under
HIPPA?
• Patient Health Information (PHI) is covered under
  HIPPA
• Any information related to the physical and mental
  health of the patient in the past, present or future is
  considered a PHI
• PHI is either created or received by the organization
  in order to properly care for the patient
Why is this important?
• Almost all healthcare units started using electronic
  medical records to make care more efficient
• This leads to breaches from both outside and within
  the organization
• One’s health information can be used as a
  commercial advantage, personal gain, or malicious
  harms
Security in HIPPA
• Patients have the right to obtain and amend their
  PHI
• They also have the right to know how PHI is used and
  who it is disclosed to
• Administrative measures must do detail record
  keeping and procedure compliance
The USA Patriot Act
About the Act
• Uniting (and) Strengthening America (by) Providing
  Appropriate Tools Required (to) Intercept (and)
  Obstruct Terrorism Act
• Passed in Oct.2001 by then president Mr. George
  Bush Jr.
• Mother of all acts
Effect of PATRIOT act on E-commerce
 Indirect repercussions
 Stringent measures for B2B and B2C transactions
 Wire transfer of money became
  difficult
 Increased interference of government
 in financial activities of Institutions
Effect on E-Governance
• Establishment of financial crime
 network (FinCNE)
• Increased data sharing
• Increased screening of foreign nationals
• Greater emphasis on knowledge management
SOPA
STOP ONLINE PIRACY ACT (2012)
STOP ONLINE PIRACY ACT (2012)
• Introduced by U.S. Representative Lamar S. Smith in
  2011
• Stack holders of SOPA
  ▫ Hollywood Production Houses e.g. Warner Brothers,
    Columbia Motion Picture
  ▫ Recording Industry e.g. Recording Industry Association
    of America
  ▫ Broadcasting Association
Organization opposing the act
•   Wikipedia
•   Google
•   Online video hosting websites
•   Websites providing Torrent facility
•   Facebook
•   Twitter
•   Flicker
Implications of SOPA
• Domain name system (DNS) will be affected
• Internal networks-VPN
• Different from PROTECT IP
• Blocking of websites with
   copyright content
• Blocking the IP addresses
Child Online Protection Act
• The      Child        Online   Protection
  Act (COPA)was a law in the United States of
  America, passed in 1998.

• The law, however, never took effect, as three
 separate rounds of litigation led to a permanent
 injunction against the law in 2009
COPPA
• Children’s Online Privacy Protection Act
• Passed on 22nd April 2000
• Protects the privacy of the children
• Destroy the data collected from children of age less
  than 13 within 1 year
• To have verifiable consent of the parents
• display the information collected on the website
PROTECT(Prosecutorial Remedies and Other Tools to end
the Exploitation of Children Today)Act

• The PROTECT Act of 2003 is a United States law with
  the stated intent of preventing child abuse.
• Authorizes wiretapping and monitoring of other
  communications in all cases related to child abuse
  or kidnapping.
• Provides for mandatory life imprisonment of sex
  offenses against a minor if the offender has had a
  prior conviction of abuse against a minor, with some
  exceptions.
Effects of PROTECT Act
• Bars pre-trial release of persons charged with
  specified offenses against or involving children.
• Establishes a program to obtain criminal history
  background checks for volunteer organizations.
• Eliminates statutes of limitations for child abduction
  or child abuse.
• Assigns a national AMBER Alert Coordinator.
• Prohibits drawings, sculptures, and pictures of such
  drawings and sculptures depicting minors in actions
  or situations that meet the Miller test of being
  obscene.
Sarbanes–Oxley Act
Sarbanes Oxley Act
• Enron and WorldCom Collapse - Financial frauds –
  led to the formation of Sarbanes Oxley act
• Key Implications
    Independence of audit committee
    CE and CFO certification of financial statements – SOX
     906
    SOX 302 – Corporate responsibility for financial reports
    SOX 409 – Real time disclosure – disclose information on
     material changes in finance on rapid and current basis
    Whistle-Blower Protection - Document Destruction
Key sections related to the Act
• SOX 404 – Management assessment of Internal
  controls over financial reporting – Role of IT
     Management create reliable internal financial controls
• Destruction of documents – Periodic policy needed
• Responsibilities IT representatives on SOX teams
     Understanding organization’s internal control program
      and financial reporting process
     Mapping the two to find financial statements
     Designing and implementing controls
     Documenting and testing the controls designed to mitigate
      risk – continuous monitoring
Contd ..
 • Strong IT controls needed
       External auditors – rely on process approach-
        Evaluation based on manual/automated controls
       Inherent security and control risk – due to virtual
        corporate and ecommerce
       Large corporate spending on IT - Greater return
        expected
 • Entry level It securities needed
       Trusted Path
       Firewall Architectures and Connections with Public
        Network – denial of services and unauthorized access
        to internal resources
       Identification, Authentication, and Access
       User account management
Case – Retail Chain
• The Scenario
     IT process used for creation, update and manipulation of
      financial data
     Own database – ERP for creation of all financial data and
      reports for SEC filings
• Audit findings
     Variety of database tools used to insert/delete/modify
      (unmitigated) data from underlying ERP databases
     User id/password for internal authentication
     No controls in org. beyond basic authentication.
Solutions
• Controls on data access and updating of underlying
  financial databases - ERP system access and any
  other access
• Automated provisioning process - segregation of
  duties to approve the creation of system user IDs
  and access privileges, as well as modification and
  removal.
• Audit logging and reporting infrastructure for
  reporting system - conformance to the organization’s
  internal policies and standards.
FISMA
Federal Information
Security Management
Act (2003)
How did FISMA originate?

  • FISMA was introduced by replacing GISRA, title III of
    the Electronic Government Act of 2002

  • The FISMA Implementation Project was established
    in January 2003 to produce several key security
    standards and guidelines required by Congressional
    legislation of USA.
Need for FISMA?
The need to secure information infrastructure used in all federal
agencies.

OBJECTIVES:
  ▫ For the implementation of a cost-effective, risk-based information
    security programs

  ▫ For the establishment of a level of security due diligence for federal
    agencies and contractors supporting the federal government

  ▫ To create a more consistent and cost-effective application of security
    controls across the federal information technology infrastructure

  ▫ To create a more consistent, comparable, and repeatable security
    control assessments
Contd..
▫ To generate a better understanding of enterprise-wide mission
  risks resulting from the operation of information systems
▫ Lastly, to create a more complete, reliable, and trustworthy
  information for authorizing officials--facilitating more informed
  security authorization decisions
▫ And also to make sure that there are more secure information
  systems within the federal government including the critical
  infrastructure of the United States
Requirements of FISMA
• Appropriate officials should be assigned
• Periodical review of the security controls of the
  information system
• Security awareness training should be done
• Guidelines laid by NSIT for information security
  control should be followed
• Lastly, plan for security should be followed
How to implement FISMA?
How to implement FISMA?
• Generally, CIO’s are given the responsibility in
  compliance with the CISO
• Then the IG’s review the process and reporting
• Reports are sent to the OMB by the end of each
  financial year.
• Reporting standards are governed by OMB 130 and
  NSIT special publication 800-26 with changes
  including of 800-53
Advantages of FISMA
• Its considered the best approach to ensure that sensitive
  government systems and data are secure
• Helps manage government systems and information,
  include insurance companies, e.g. Medicare claims, and
  out sourcecing companies which manage federal
  systems, such as Lockheed Martin, Northrop Grumman
• FISMA reports by mandating a standard interface and
  follow a format for entering FISMA data. The OMB then
  provides this data via reports to other agencies.
References
• http://csrc.nist.gov/groups/SMA/fisma/index.html
• http://www.authorstream.com/Presentation/aSGues
  t7375-125409-fisma-business-finance-ppt-
  powerpoint/
• http://community.ca.com/blogs/iam/archive/2009/1
  1/12/the-relative-adoption-of-fisma.aspx
• http://csrc.nist.gov/groups/SMA/fisma/index.html
• http://searchsecurity.techtarget.com/definition/Fede
  ral-Information-Security-Management-Act
References contd ….

•   Wikipedia
•   http://www.coppa.org/coppa.htm
•   www.fincen.gov › Statutes & Regulations
•   www.hhs.gov
•   http://news.cnet.com/8301-31921_3-57329001-281/how-sopa-would-affect-you-
    faq/
•   http://www.pwc.lu/en_LU/lu/it-effectiveness/docs/pwc-sarbanes-
    oxley210606.pdf
•   http://www.sans.org/reading_room/whitepapers/casestudies/impact-sarbanes-
    oxley-act-security_1344
•   . http://www.auerbach-publications.com/dynamic_data/2928_1724_76-10-
    01.pdf. http://accounting.smartpros.com/x43196.xml
•   http://www.stalback.net/duppsats.pdf
•   http://www.aacsb.edu/publications/archives/julyaug05/p24-29.pdf

Mais conteúdo relacionado

Mais procurados

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislationUlf Mattsson
 
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...eringold
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Canadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and OverviewCanadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and OverviewResilient Systems
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...ARMA International
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000n|u - The Open Security Community
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorCBIZ, Inc.
 
Gdpr brexit presentation for brighton seo
Gdpr brexit presentation for brighton seoGdpr brexit presentation for brighton seo
Gdpr brexit presentation for brighton seoKeithBudden3
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference Endcode_org
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsAnitafin
 

Mais procurados (19)

Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Examples of international privacy legislation
Examples of international privacy legislationExamples of international privacy legislation
Examples of international privacy legislation
 
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
PACT Cybersecurity Series Event, speaker Gregory M. Fliszar, Esq. of Cozen O'...
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Canadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and OverviewCanadian Breach Regulations: Introduction and Overview
Canadian Breach Regulations: Introduction and Overview
 
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000Regulatory Compliance under the Information Technology Act, 2000
Regulatory Compliance under the Information Technology Act, 2000
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
Gdpr brexit presentation for brighton seo
Gdpr brexit presentation for brighton seoGdpr brexit presentation for brighton seo
Gdpr brexit presentation for brighton seo
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Cyber Banking Conference
Cyber Banking Conference Cyber Banking Conference
Cyber Banking Conference
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 

Semelhante a Implications of acts in organizations

CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Case for Compliant IM
Case for Compliant IMCase for Compliant IM
Case for Compliant IMcmteti
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsDoubleHorn
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...Jason Haislmaier
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analyticsshekharkanodia
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 

Semelhante a Implications of acts in organizations (20)

CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Case for Compliant IM
Case for Compliant IMCase for Compliant IM
Case for Compliant IM
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016Tim Willoughby - Presentation to Innovation Masters 2016
Tim Willoughby - Presentation to Innovation Masters 2016
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Privacy issues in data analytics
Privacy issues in data analyticsPrivacy issues in data analytics
Privacy issues in data analytics
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!Your data is your business: Secure it or Lose it!
Your data is your business: Secure it or Lose it!
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 

Mais de Swarupa Rani Sahu

Mais de Swarupa Rani Sahu (20)

Nivea
NiveaNivea
Nivea
 
Black and Decker: Household Products Groups: Brand Transition
Black and Decker: Household Products Groups: Brand TransitionBlack and Decker: Household Products Groups: Brand Transition
Black and Decker: Household Products Groups: Brand Transition
 
Land Rover North America
Land Rover North AmericaLand Rover North America
Land Rover North America
 
McDonald's
McDonald's McDonald's
McDonald's
 
The health travelers
The health travelersThe health travelers
The health travelers
 
Marketing plan for immunity booster(in health products)
Marketing plan for immunity booster(in health products)Marketing plan for immunity booster(in health products)
Marketing plan for immunity booster(in health products)
 
Yoplaits
Yoplaits Yoplaits
Yoplaits
 
Cunard Line Ltd : Integrated marketing communication
Cunard Line Ltd : Integrated marketing communicationCunard Line Ltd : Integrated marketing communication
Cunard Line Ltd : Integrated marketing communication
 
Brand pipe company
Brand pipe companyBrand pipe company
Brand pipe company
 
Cola wars
Cola warsCola wars
Cola wars
 
What 2012 has in store for HR ?
What 2012 has in store for HR ?What 2012 has in store for HR ?
What 2012 has in store for HR ?
 
P&G Canada : Developing Scope Advertising copy
P&G Canada : Developing Scope Advertising copyP&G Canada : Developing Scope Advertising copy
P&G Canada : Developing Scope Advertising copy
 
Google voice
Google voice Google voice
Google voice
 
THE COMPANY I ADMIRE THE MOST FOR ITS CORPORATE SOCIAL RESPONSIBILITY
THE COMPANY I ADMIRE THE MOST FOR ITS CORPORATE SOCIAL RESPONSIBILITYTHE COMPANY I ADMIRE THE MOST FOR ITS CORPORATE SOCIAL RESPONSIBILITY
THE COMPANY I ADMIRE THE MOST FOR ITS CORPORATE SOCIAL RESPONSIBILITY
 
Always a winner
Always  a winnerAlways  a winner
Always a winner
 
India's Formula 1 debut
India's Formula 1 debutIndia's Formula 1 debut
India's Formula 1 debut
 
Organisational culture
Organisational cultureOrganisational culture
Organisational culture
 
Decision making
Decision makingDecision making
Decision making
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio Analysis
 
Materials management system
Materials management systemMaterials management system
Materials management system
 

Último

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 

Último (20)

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 

Implications of acts in organizations

  • 1. Implications of Acts in Organizations Deepak . S Kasturi Pal Mervin.S Sudhanshu cyril Swarupa rani sahu
  • 2. HIPAA Health Insurance Portability and Accountability Act
  • 3. What is HIPAA? • The Health Insurance Portability and Accountability Act enacted by the U.S. Congress • Uses electronically exchangeable data to effectively help in healthcare • Standards are used to monitor confidentiality and security of the patient data
  • 4. What information is covered under HIPPA? • Patient Health Information (PHI) is covered under HIPPA • Any information related to the physical and mental health of the patient in the past, present or future is considered a PHI • PHI is either created or received by the organization in order to properly care for the patient
  • 5. Why is this important? • Almost all healthcare units started using electronic medical records to make care more efficient • This leads to breaches from both outside and within the organization • One’s health information can be used as a commercial advantage, personal gain, or malicious harms
  • 6. Security in HIPPA • Patients have the right to obtain and amend their PHI • They also have the right to know how PHI is used and who it is disclosed to • Administrative measures must do detail record keeping and procedure compliance
  • 8. About the Act • Uniting (and) Strengthening America (by) Providing Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism Act • Passed in Oct.2001 by then president Mr. George Bush Jr. • Mother of all acts
  • 9. Effect of PATRIOT act on E-commerce  Indirect repercussions  Stringent measures for B2B and B2C transactions  Wire transfer of money became difficult  Increased interference of government  in financial activities of Institutions
  • 10. Effect on E-Governance • Establishment of financial crime network (FinCNE) • Increased data sharing • Increased screening of foreign nationals • Greater emphasis on knowledge management
  • 12. STOP ONLINE PIRACY ACT (2012) • Introduced by U.S. Representative Lamar S. Smith in 2011 • Stack holders of SOPA ▫ Hollywood Production Houses e.g. Warner Brothers, Columbia Motion Picture ▫ Recording Industry e.g. Recording Industry Association of America ▫ Broadcasting Association
  • 13. Organization opposing the act • Wikipedia • Google • Online video hosting websites • Websites providing Torrent facility • Facebook • Twitter • Flicker
  • 14. Implications of SOPA • Domain name system (DNS) will be affected • Internal networks-VPN • Different from PROTECT IP • Blocking of websites with copyright content • Blocking the IP addresses
  • 16. • The Child Online Protection Act (COPA)was a law in the United States of America, passed in 1998. • The law, however, never took effect, as three separate rounds of litigation led to a permanent injunction against the law in 2009
  • 17. COPPA • Children’s Online Privacy Protection Act • Passed on 22nd April 2000 • Protects the privacy of the children • Destroy the data collected from children of age less than 13 within 1 year • To have verifiable consent of the parents • display the information collected on the website
  • 18. PROTECT(Prosecutorial Remedies and Other Tools to end the Exploitation of Children Today)Act • The PROTECT Act of 2003 is a United States law with the stated intent of preventing child abuse. • Authorizes wiretapping and monitoring of other communications in all cases related to child abuse or kidnapping. • Provides for mandatory life imprisonment of sex offenses against a minor if the offender has had a prior conviction of abuse against a minor, with some exceptions.
  • 19. Effects of PROTECT Act • Bars pre-trial release of persons charged with specified offenses against or involving children. • Establishes a program to obtain criminal history background checks for volunteer organizations. • Eliminates statutes of limitations for child abduction or child abuse. • Assigns a national AMBER Alert Coordinator. • Prohibits drawings, sculptures, and pictures of such drawings and sculptures depicting minors in actions or situations that meet the Miller test of being obscene.
  • 21. Sarbanes Oxley Act • Enron and WorldCom Collapse - Financial frauds – led to the formation of Sarbanes Oxley act • Key Implications  Independence of audit committee  CE and CFO certification of financial statements – SOX 906  SOX 302 – Corporate responsibility for financial reports  SOX 409 – Real time disclosure – disclose information on material changes in finance on rapid and current basis  Whistle-Blower Protection - Document Destruction
  • 22. Key sections related to the Act • SOX 404 – Management assessment of Internal controls over financial reporting – Role of IT  Management create reliable internal financial controls • Destruction of documents – Periodic policy needed • Responsibilities IT representatives on SOX teams  Understanding organization’s internal control program and financial reporting process  Mapping the two to find financial statements  Designing and implementing controls  Documenting and testing the controls designed to mitigate risk – continuous monitoring
  • 23. Contd .. • Strong IT controls needed  External auditors – rely on process approach- Evaluation based on manual/automated controls  Inherent security and control risk – due to virtual corporate and ecommerce  Large corporate spending on IT - Greater return expected • Entry level It securities needed  Trusted Path  Firewall Architectures and Connections with Public Network – denial of services and unauthorized access to internal resources  Identification, Authentication, and Access  User account management
  • 24. Case – Retail Chain • The Scenario  IT process used for creation, update and manipulation of financial data  Own database – ERP for creation of all financial data and reports for SEC filings • Audit findings  Variety of database tools used to insert/delete/modify (unmitigated) data from underlying ERP databases  User id/password for internal authentication  No controls in org. beyond basic authentication.
  • 25. Solutions • Controls on data access and updating of underlying financial databases - ERP system access and any other access • Automated provisioning process - segregation of duties to approve the creation of system user IDs and access privileges, as well as modification and removal. • Audit logging and reporting infrastructure for reporting system - conformance to the organization’s internal policies and standards.
  • 27. How did FISMA originate? • FISMA was introduced by replacing GISRA, title III of the Electronic Government Act of 2002 • The FISMA Implementation Project was established in January 2003 to produce several key security standards and guidelines required by Congressional legislation of USA.
  • 28. Need for FISMA? The need to secure information infrastructure used in all federal agencies. OBJECTIVES: ▫ For the implementation of a cost-effective, risk-based information security programs ▫ For the establishment of a level of security due diligence for federal agencies and contractors supporting the federal government ▫ To create a more consistent and cost-effective application of security controls across the federal information technology infrastructure ▫ To create a more consistent, comparable, and repeatable security control assessments
  • 29. Contd.. ▫ To generate a better understanding of enterprise-wide mission risks resulting from the operation of information systems ▫ Lastly, to create a more complete, reliable, and trustworthy information for authorizing officials--facilitating more informed security authorization decisions ▫ And also to make sure that there are more secure information systems within the federal government including the critical infrastructure of the United States
  • 30. Requirements of FISMA • Appropriate officials should be assigned • Periodical review of the security controls of the information system • Security awareness training should be done • Guidelines laid by NSIT for information security control should be followed • Lastly, plan for security should be followed
  • 32. How to implement FISMA? • Generally, CIO’s are given the responsibility in compliance with the CISO • Then the IG’s review the process and reporting • Reports are sent to the OMB by the end of each financial year. • Reporting standards are governed by OMB 130 and NSIT special publication 800-26 with changes including of 800-53
  • 33. Advantages of FISMA • Its considered the best approach to ensure that sensitive government systems and data are secure • Helps manage government systems and information, include insurance companies, e.g. Medicare claims, and out sourcecing companies which manage federal systems, such as Lockheed Martin, Northrop Grumman • FISMA reports by mandating a standard interface and follow a format for entering FISMA data. The OMB then provides this data via reports to other agencies.
  • 34. References • http://csrc.nist.gov/groups/SMA/fisma/index.html • http://www.authorstream.com/Presentation/aSGues t7375-125409-fisma-business-finance-ppt- powerpoint/ • http://community.ca.com/blogs/iam/archive/2009/1 1/12/the-relative-adoption-of-fisma.aspx • http://csrc.nist.gov/groups/SMA/fisma/index.html • http://searchsecurity.techtarget.com/definition/Fede ral-Information-Security-Management-Act
  • 35. References contd …. • Wikipedia • http://www.coppa.org/coppa.htm • www.fincen.gov › Statutes & Regulations • www.hhs.gov • http://news.cnet.com/8301-31921_3-57329001-281/how-sopa-would-affect-you- faq/ • http://www.pwc.lu/en_LU/lu/it-effectiveness/docs/pwc-sarbanes- oxley210606.pdf • http://www.sans.org/reading_room/whitepapers/casestudies/impact-sarbanes- oxley-act-security_1344 • . http://www.auerbach-publications.com/dynamic_data/2928_1724_76-10- 01.pdf. http://accounting.smartpros.com/x43196.xml • http://www.stalback.net/duppsats.pdf • http://www.aacsb.edu/publications/archives/julyaug05/p24-29.pdf

Notas do Editor

  1. FBI’s Integrated Automated Fingerprint Identification System (IAFIS)