SlideShare a Scribd company logo
1 of 34
LEGAL, ETHICAL, AND PROFESSIONAL
ISSUES IN INFORMATION SECURITY
 Differentiate between laws and ethics
 Identify major national laws that relate to
the practice of information security
 Understand the role of culture as it applies
to ethics in information security
Objectives
INTRODUCTION
 You must understand scope of an
organization’s legal and ethical
responsibilities
 To minimize liabilities/reduce risks, the
information security practitioner must:
 Understand current legal environment
 Stay current with laws and regulations
 Watch for new issues that emerge
LAW AND ETHICS IN INFORMATION SECURITY
 Laws: rules that mandate or prohibit
certain societal behavior
 Ethics: define socially acceptable behavior
 Cultural mores: fixed moral attitudes or
customs of a particular group; ethics
based on these
 Laws carry sanctions of a governing
authority; ethics do not
TYPES OF LAW
 Civil
 Criminal
 Tort
 Private
 Public
RELEVANT U.S. LAWS (GENERAL)
 Computer Fraud and Abuse Act of 1986 (CFA
Act)
 National Information Infrastructure Protection Act
of 1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and
Competition Act
of 1996
 Communications Decency Act of 1996 (CDA)
 Computer Security Act of 1987
PRIVACY
 One of the hottest topics in information
security
 Is a “state of being free from unsanctioned
intrusion”
 Ability to aggregate data from multiple
sources allows creation of information
databases previously unheard of
PRIVACY OF CUSTOMER INFORMATION
 Privacy of Customer Information Section of
common carrier regulation
 Federal Privacy Act of 1974
 Electronic Communications Privacy Act of 1986
 Health Insurance Portability and Accountability
Act of 1996 (HIPAA), aka Kennedy-Kassebaum
Act
 Financial Services Modernization Act, or
Gramm-Leach-Bliley Act of 1999
EXPORT AND ESPIONAGE LAWS
 Economic Espionage Act of 1996 (EEA)
 Security And Freedom Through
Encryption Act of 1999 (SAFE)
U.S. COPYRIGHT LAW
 Intellectual property recognized as protected
asset in the U.S.; copyright law extends to
electronic formats
 With proper acknowledgement, permissible
to include portions of others’ work as
reference
 U.S. Copyright Office Web site:
www.copyright.gov
FREEDOM OF INFORMATION ACT OF 1966
(FOIA)
 Allows access to federal agency records
or information not determined to be matter
of national security
 U.S. government agencies required to
disclose any requested information upon
receipt of written request
 Some information protected from
disclosure
STATE AND LOCAL REGULATIONS
 Restrictions on organizational computer
technology use exist at international,
national, state, local levels
 Information security professional responsible
for understanding state regulations and
ensuring organization is compliant with
regulations
INTERNATIONAL LAWS AND LEGAL BODIES
 European Council Cyber-Crime Convention:
 Establishes international task force overseeing
Internet security functions for standardized
international
technology laws
 Attempts to improve effectiveness of international
investigations into breaches of technology law
 Well received by intellectual property rights
advocates due to emphasis on copyright
infringement prosecution
 Lacks realistic provisions for enforcement
DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)
 U.S. contribution to international effort to
reduce impact of copyright, trademark,
and privacy infringement
 A response to European Union Directive
95/46/EC, which adds protection to
individuals with regard to processing and
free movement of personal data
UNITED NATIONS CHARTER
 Makes provisions, to a degree, for
information security during information
warfare (IW)
 IW involves use of information technology to
conduct organized and lawful military
operations
 IW is relatively new type of warfare, although
military has been conducting electronic
warfare operations for decades
POLICY VERSUS LAW
 Most organizations develop and
formalize a body of expectations called
policy
 Policies serve as organizational laws
 To be enforceable, policy must be
distributed, readily available, easily
understood, and acknowledged by
employees
ETHICS AND INFORMATION SECURITY
ETHICAL DIFFERENCES ACROSS CULTURES
 Cultural differences create difficulty in
determining what is and is not ethical
 Difficulties arise when one nationality’s
ethical behavior conflicts with ethics of
another national group
 Example: many of ways in which Asian
cultures use computer technology is
software piracy
ETHICS AND EDUCATION
 Overriding factor in leveling ethical
perceptions within a small population is
education
 Employees must be trained in expected
behaviors of an ethical employee, especially
in areas of information security
 Proper ethical training vital to creating
informed, well prepared, and low-risk system
user
DETERRENCE TO UNETHICAL AND ILLEGAL
BEHAVIOR
 Deterrence: best method for preventing an
illegal or unethical activity; e.g., laws,
policies, technical controls
 Laws and policies only deter if three
conditions are present:
 Fear of penalty
 Probability of being caught
 Probability of penalty being administered
CODES OF ETHICS AND PROFESSIONAL
ORGANIZATIONS
 Several professional organizations have
established codes of conduct/ethics
 Codes of ethics can have positive effect;
unfortunately, many employers do not
encourage joining of these professional
organizations
 Responsibility of security professionals to act
ethically and according to policies of
employer, professional organization, and laws
of society
ASSOCIATION OF COMPUTING MACHINERY
(ACM)
 ACM established in 1947 as “the world's
first educational and scientific computing
society”
 Code of ethics contains references to
protecting information confidentiality,
causing no harm, protecting others’
privacy, and respecting others’ intellectual
property
INTERNATIONAL INFORMATION SYSTEMS
SECURITY CERTIFICATION CONSORTIUM, INC.
(ISC)2
 Non-profit organization focusing on development
and implementation of information security
certifications and credentials
 Code primarily designed for information security
professionals who have certification from (ISC)2
 Code of ethics focuses on four mandatory
canons
SYSTEM ADMINISTRATION, NETWORKING,
AND SECURITY INSTITUTE (SANS)
 Professional organization with a large
membership dedicated to protection of
information and systems
 SANS offers set of certifications called
Global Information Assurance Certification
(GIAC)
INFORMATION SYSTEMS AUDIT AND
CONTROL ASSOCIATION (ISACA)
 Professional association with focus on
auditing, control, and security
 Concentrates on providing IT control
practices and standards
 ISACA has code of ethics for its
professionals
COMPUTER SECURITY INSTITUTE (CSI)
 Provides information and training to support
computer, networking, and information
security professionals
 Though without a code of ethics, has argued
for adoption of ethical behavior among
information security professionals
INFORMATION SYSTEMS SECURITY
ASSOCIATION (ISSA)
 Nonprofit society of information security
(IS) professionals
 Primary mission to bring together qualified
IS practitioners for information exchange
and educational development
 Promotes code of ethics similar to (ISC)2,
ISACA and ACM
OTHER SECURITY ORGANIZATIONS
 Internet Society (ISOC): promotes
development and implementation of
education, standards, policy and education to
promote the Internet
 Computer Security Division (CSD): division of
National Institute for Standards and
Technology (NIST); promotes industry best
practices and is important reference for
information security professionals
OTHER SECURITY ORGANIZATIONS (CONTINUED)
 CERT Coordination Center (CERT/CC):
center of Internet security expertise
operated by Carnegie Mellon University
 Computer Professionals for Social
Responsibility (CPSR): public organization
for anyone concerned with impact of
computer technology on society
KEY U.S. FEDERAL AGENCIES
 Department of Homeland Security (DHS)
 Federal Bureau of Investigation’s National
Infrastructure Protection Center (NIPC)
 National Security Agency (NSA)
 U.S. Secret Service
ORGANIZATIONAL LIABILITY AND THE NEED
FOR COUNSEL
 Liability is legal obligation of an entity;
includes legal obligation to make restitution
for wrongs committed
 Organization increases liability if it refuses
to take measures known as due care
 Due diligence requires that an organization
make valid effort to protect others and
continually maintain that level of effort
SUMMARY
 Laws: rules that mandate or prohibit
certain behavior in society; drawn from
ethics
 Ethics: define socially acceptable
behaviors; based on cultural mores (fixed
moral attitudes or customs of a particular
group)
 Types of law: civil, criminal, tort law,
private, public
SUMMARY
 Relevant U.S. laws:
 Computer Fraud and Abuse Act of 1986 (CFA Act)
 National Information Infrastructure Protection Act of
1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and Competition
Act
of 1996
 Communications Decency Act of 1996 (CDA)
 Computer Security Act of 1987
SUMMARY
 Many organizations have codes of conduct and/or
codes of ethics
 Organization increases liability if it refuses to take
measures known as due care
 Due diligence requires that organization make valid
effort to protect others and continually maintain that
effort

More Related Content

What's hot

CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securitySelf-employed
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 

What's hot (20)

Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Chapter 11 laws and ethic information security
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information security
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Information security
Information securityInformation security
Information security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Security policy
Security policySecurity policy
Security policy
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Information security
Information securityInformation security
Information security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Information security management
Information security managementInformation security management
Information security management
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 

Similar to Legal, Ethical, and Professional Issues In Information Security

ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfssuserceaa40
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxEdFeranil
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.pptpixvilx
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdfMeshalALshammari12
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Mukesh Chinta
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 

Similar to Legal, Ethical, and Professional Issues In Information Security (20)

ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Chapter3.ppt
Chapter3.pptChapter3.ppt
Chapter3.ppt
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 

More from Carl Ceder

Carl Ceder - What To Do If You Get Into A Car Accident
Carl Ceder - What To Do If You Get Into A Car AccidentCarl Ceder - What To Do If You Get Into A Car Accident
Carl Ceder - What To Do If You Get Into A Car AccidentCarl Ceder
 
Carl Ceder - Assault and Battery
Carl Ceder - Assault and BatteryCarl Ceder - Assault and Battery
Carl Ceder - Assault and BatteryCarl Ceder
 
Carl Ceder - Attorney at Law
Carl Ceder - Attorney at LawCarl Ceder - Attorney at Law
Carl Ceder - Attorney at LawCarl Ceder
 
Carl Ceder - Cachitos
Carl Ceder - CachitosCarl Ceder - Cachitos
Carl Ceder - CachitosCarl Ceder
 
Carl Ceder - Goldeados
Carl Ceder - GoldeadosCarl Ceder - Goldeados
Carl Ceder - GoldeadosCarl Ceder
 
Carl Ceder - Arepas recipe
Carl Ceder - Arepas recipeCarl Ceder - Arepas recipe
Carl Ceder - Arepas recipeCarl Ceder
 

More from Carl Ceder (6)

Carl Ceder - What To Do If You Get Into A Car Accident
Carl Ceder - What To Do If You Get Into A Car AccidentCarl Ceder - What To Do If You Get Into A Car Accident
Carl Ceder - What To Do If You Get Into A Car Accident
 
Carl Ceder - Assault and Battery
Carl Ceder - Assault and BatteryCarl Ceder - Assault and Battery
Carl Ceder - Assault and Battery
 
Carl Ceder - Attorney at Law
Carl Ceder - Attorney at LawCarl Ceder - Attorney at Law
Carl Ceder - Attorney at Law
 
Carl Ceder - Cachitos
Carl Ceder - CachitosCarl Ceder - Cachitos
Carl Ceder - Cachitos
 
Carl Ceder - Goldeados
Carl Ceder - GoldeadosCarl Ceder - Goldeados
Carl Ceder - Goldeados
 
Carl Ceder - Arepas recipe
Carl Ceder - Arepas recipeCarl Ceder - Arepas recipe
Carl Ceder - Arepas recipe
 

Recently uploaded

Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its historyprasannamurthy6
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Rich Bergeron
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasBrandy Austin
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxgurcharnsinghlecengl
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in SalesMelvinPernez2
 

Recently uploaded (20)

Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its history
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
Town of Haverhill's Statement of Facts for Summary Judgment on Counterclaims ...
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in Texas
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptxThe Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
The Punjab Land Reforms AcT 1972 HIRDEBIR.pptx
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales
 

Legal, Ethical, and Professional Issues In Information Security

  • 1. LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY
  • 2.  Differentiate between laws and ethics  Identify major national laws that relate to the practice of information security  Understand the role of culture as it applies to ethics in information security Objectives
  • 3. INTRODUCTION  You must understand scope of an organization’s legal and ethical responsibilities  To minimize liabilities/reduce risks, the information security practitioner must:  Understand current legal environment  Stay current with laws and regulations  Watch for new issues that emerge
  • 4. LAW AND ETHICS IN INFORMATION SECURITY  Laws: rules that mandate or prohibit certain societal behavior  Ethics: define socially acceptable behavior  Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these  Laws carry sanctions of a governing authority; ethics do not
  • 5. TYPES OF LAW  Civil  Criminal  Tort  Private  Public
  • 6. RELEVANT U.S. LAWS (GENERAL)  Computer Fraud and Abuse Act of 1986 (CFA Act)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Communications Decency Act of 1996 (CDA)  Computer Security Act of 1987
  • 7. PRIVACY  One of the hottest topics in information security  Is a “state of being free from unsanctioned intrusion”  Ability to aggregate data from multiple sources allows creation of information databases previously unheard of
  • 8. PRIVACY OF CUSTOMER INFORMATION  Privacy of Customer Information Section of common carrier regulation  Federal Privacy Act of 1974  Electronic Communications Privacy Act of 1986  Health Insurance Portability and Accountability Act of 1996 (HIPAA), aka Kennedy-Kassebaum Act  Financial Services Modernization Act, or Gramm-Leach-Bliley Act of 1999
  • 9. EXPORT AND ESPIONAGE LAWS  Economic Espionage Act of 1996 (EEA)  Security And Freedom Through Encryption Act of 1999 (SAFE)
  • 10. U.S. COPYRIGHT LAW  Intellectual property recognized as protected asset in the U.S.; copyright law extends to electronic formats  With proper acknowledgement, permissible to include portions of others’ work as reference  U.S. Copyright Office Web site: www.copyright.gov
  • 11. FREEDOM OF INFORMATION ACT OF 1966 (FOIA)  Allows access to federal agency records or information not determined to be matter of national security  U.S. government agencies required to disclose any requested information upon receipt of written request  Some information protected from disclosure
  • 12. STATE AND LOCAL REGULATIONS  Restrictions on organizational computer technology use exist at international, national, state, local levels  Information security professional responsible for understanding state regulations and ensuring organization is compliant with regulations
  • 13. INTERNATIONAL LAWS AND LEGAL BODIES  European Council Cyber-Crime Convention:  Establishes international task force overseeing Internet security functions for standardized international technology laws  Attempts to improve effectiveness of international investigations into breaches of technology law  Well received by intellectual property rights advocates due to emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement
  • 14. DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)  U.S. contribution to international effort to reduce impact of copyright, trademark, and privacy infringement  A response to European Union Directive 95/46/EC, which adds protection to individuals with regard to processing and free movement of personal data
  • 15. UNITED NATIONS CHARTER  Makes provisions, to a degree, for information security during information warfare (IW)  IW involves use of information technology to conduct organized and lawful military operations  IW is relatively new type of warfare, although military has been conducting electronic warfare operations for decades
  • 16. POLICY VERSUS LAW  Most organizations develop and formalize a body of expectations called policy  Policies serve as organizational laws  To be enforceable, policy must be distributed, readily available, easily understood, and acknowledged by employees
  • 18. ETHICAL DIFFERENCES ACROSS CULTURES  Cultural differences create difficulty in determining what is and is not ethical  Difficulties arise when one nationality’s ethical behavior conflicts with ethics of another national group  Example: many of ways in which Asian cultures use computer technology is software piracy
  • 19. ETHICS AND EDUCATION  Overriding factor in leveling ethical perceptions within a small population is education  Employees must be trained in expected behaviors of an ethical employee, especially in areas of information security  Proper ethical training vital to creating informed, well prepared, and low-risk system user
  • 20. DETERRENCE TO UNETHICAL AND ILLEGAL BEHAVIOR  Deterrence: best method for preventing an illegal or unethical activity; e.g., laws, policies, technical controls  Laws and policies only deter if three conditions are present:  Fear of penalty  Probability of being caught  Probability of penalty being administered
  • 21. CODES OF ETHICS AND PROFESSIONAL ORGANIZATIONS  Several professional organizations have established codes of conduct/ethics  Codes of ethics can have positive effect; unfortunately, many employers do not encourage joining of these professional organizations  Responsibility of security professionals to act ethically and according to policies of employer, professional organization, and laws of society
  • 22. ASSOCIATION OF COMPUTING MACHINERY (ACM)  ACM established in 1947 as “the world's first educational and scientific computing society”  Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others’ privacy, and respecting others’ intellectual property
  • 23. INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. (ISC)2  Non-profit organization focusing on development and implementation of information security certifications and credentials  Code primarily designed for information security professionals who have certification from (ISC)2  Code of ethics focuses on four mandatory canons
  • 24. SYSTEM ADMINISTRATION, NETWORKING, AND SECURITY INSTITUTE (SANS)  Professional organization with a large membership dedicated to protection of information and systems  SANS offers set of certifications called Global Information Assurance Certification (GIAC)
  • 25. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA)  Professional association with focus on auditing, control, and security  Concentrates on providing IT control practices and standards  ISACA has code of ethics for its professionals
  • 26. COMPUTER SECURITY INSTITUTE (CSI)  Provides information and training to support computer, networking, and information security professionals  Though without a code of ethics, has argued for adoption of ethical behavior among information security professionals
  • 27. INFORMATION SYSTEMS SECURITY ASSOCIATION (ISSA)  Nonprofit society of information security (IS) professionals  Primary mission to bring together qualified IS practitioners for information exchange and educational development  Promotes code of ethics similar to (ISC)2, ISACA and ACM
  • 28. OTHER SECURITY ORGANIZATIONS  Internet Society (ISOC): promotes development and implementation of education, standards, policy and education to promote the Internet  Computer Security Division (CSD): division of National Institute for Standards and Technology (NIST); promotes industry best practices and is important reference for information security professionals
  • 29. OTHER SECURITY ORGANIZATIONS (CONTINUED)  CERT Coordination Center (CERT/CC): center of Internet security expertise operated by Carnegie Mellon University  Computer Professionals for Social Responsibility (CPSR): public organization for anyone concerned with impact of computer technology on society
  • 30. KEY U.S. FEDERAL AGENCIES  Department of Homeland Security (DHS)  Federal Bureau of Investigation’s National Infrastructure Protection Center (NIPC)  National Security Agency (NSA)  U.S. Secret Service
  • 31. ORGANIZATIONAL LIABILITY AND THE NEED FOR COUNSEL  Liability is legal obligation of an entity; includes legal obligation to make restitution for wrongs committed  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that an organization make valid effort to protect others and continually maintain that level of effort
  • 32. SUMMARY  Laws: rules that mandate or prohibit certain behavior in society; drawn from ethics  Ethics: define socially acceptable behaviors; based on cultural mores (fixed moral attitudes or customs of a particular group)  Types of law: civil, criminal, tort law, private, public
  • 33. SUMMARY  Relevant U.S. laws:  Computer Fraud and Abuse Act of 1986 (CFA Act)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Communications Decency Act of 1996 (CDA)  Computer Security Act of 1987
  • 34. SUMMARY  Many organizations have codes of conduct and/or codes of ethics  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that organization make valid effort to protect others and continually maintain that effort