SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Information Security Legislation “ A Practical Guide to Security Assessments” By Sudhanshu Kairab (Chapter 10) Sohel  Imroz 4/4/2006
Some “not-so-bad” News ,[object Object],[object Object],[object Object],[object Object]
Some “very bad” News ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some “scary” News ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HIPAA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HIPAA (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
HIPAA (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HIPAA (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GLBA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GLBA (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GLBA (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sarbanes-Oxley Act ,[object Object],[object Object],[object Object]
Sarbanes-Oxley Act (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sarbanes-Oxley Act (cont’d) ,[object Object],[object Object],[object Object]
Safe Harbor ,[object Object],[object Object],[object Object],[object Object]
Safe Harbor (cont’d) ,[object Object],[object Object],[object Object],[object Object]
Safe Harbor (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FISMA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FISMA  (cont’d) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Francesca Fanucci, Ppt
Francesca Fanucci, PptFrancesca Fanucci, Ppt
Francesca Fanucci, Ppt
guestbc7697
 
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google SpainDisclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
David Erdos
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
PECB
 

Was ist angesagt? (20)

Maeve Mc Donagh
Maeve Mc DonaghMaeve Mc Donagh
Maeve Mc Donagh
 
#FIRMday Manchester Autumn 2017 - The General Data Protection Regulation (GDP...
#FIRMday Manchester Autumn 2017 - The General Data Protection Regulation (GDP...#FIRMday Manchester Autumn 2017 - The General Data Protection Regulation (GDP...
#FIRMday Manchester Autumn 2017 - The General Data Protection Regulation (GDP...
 
The EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to knowThe EU Data Protection Regulation - what you need to know
The EU Data Protection Regulation - what you need to know
 
Data Protection Reform: What Businesses Need to know About GDPR and its Impac...
Data Protection Reform: What Businesses Need to know About GDPR and its Impac...Data Protection Reform: What Businesses Need to know About GDPR and its Impac...
Data Protection Reform: What Businesses Need to know About GDPR and its Impac...
 
Francesca Fanucci, Ppt
Francesca Fanucci, PptFrancesca Fanucci, Ppt
Francesca Fanucci, Ppt
 
EU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe HarborEU Data Protection Requirements Post-Safe Harbor
EU Data Protection Requirements Post-Safe Harbor
 
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google SpainDisclosure, Exposure and the "Right to be Forgotten" After Google Spain
Disclosure, Exposure and the "Right to be Forgotten" After Google Spain
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
 
The EU’s General Data Protection Regulation - What you need to know (please c...
The EU’s General Data Protection Regulation - What you need to know (please c...The EU’s General Data Protection Regulation - What you need to know (please c...
The EU’s General Data Protection Regulation - What you need to know (please c...
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
 
Key Recommendations for Health Information Privacy Reform
Key Recommendations for Health Information Privacy ReformKey Recommendations for Health Information Privacy Reform
Key Recommendations for Health Information Privacy Reform
 
EU General Data Protection Regulation
EU General Data Protection RegulationEU General Data Protection Regulation
EU General Data Protection Regulation
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
Blake Lapthorn's In-House Lawyer and Decision Makers' forum - 'Health & Safet...
 
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)New General Data Protection Regulation (Agnes Andersson Hammarstrand)
New General Data Protection Regulation (Agnes Andersson Hammarstrand)
 
Data Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New RegulationsData Privacy Trends in 2021: Compliance with New Regulations
Data Privacy Trends in 2021: Compliance with New Regulations
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
The GDPR Armageddon – One year on
The GDPR Armageddon – One year onThe GDPR Armageddon – One year on
The GDPR Armageddon – One year on
 

Andere mochten auch (6)

Er1 employment exchange
Er1 employment exchangeEr1 employment exchange
Er1 employment exchange
 
Understanding Secondary Legislation 29 November 2010
Understanding Secondary Legislation 29 November 2010Understanding Secondary Legislation 29 November 2010
Understanding Secondary Legislation 29 November 2010
 
HRM - The employment exchanges Act 1959
HRM - The employment exchanges Act 1959HRM - The employment exchanges Act 1959
HRM - The employment exchanges Act 1959
 
The apprentices act 1961
The apprentices act 1961The apprentices act 1961
The apprentices act 1961
 
social security legislation
social security legislationsocial security legislation
social security legislation
 
PPT on "Labour Laws in India"
PPT on "Labour Laws in India"PPT on "Labour Laws in India"
PPT on "Labour Laws in India"
 

Ähnlich wie Information security legislation

The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
Craig Mullins
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
Nicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
Nicholas Davis
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
NeoCertified
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
Samir Jha
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Lance Michalson
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 

Ähnlich wie Information security legislation (20)

The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
Case for-secure-email-encryption
Case for-secure-email-encryptionCase for-secure-email-encryption
Case for-secure-email-encryption
 
PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?PECB Webinar: The End of Safe Harbour! What happens Next?
PECB Webinar: The End of Safe Harbour! What happens Next?
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Dc fcpa tour final ho
Dc fcpa tour final hoDc fcpa tour final ho
Dc fcpa tour final ho
 
An Essential Guide to EU GDPR
An Essential Guide to EU GDPRAn Essential Guide to EU GDPR
An Essential Guide to EU GDPR
 
How to protect whistleblowers
How to protect whistleblowersHow to protect whistleblowers
How to protect whistleblowers
 
GPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-RightGPDR_Get-Data-Protection-Right
GPDR_Get-Data-Protection-Right
 
Regulations And Standards For DR
Regulations And Standards For DRRegulations And Standards For DR
Regulations And Standards For DR
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
CCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.pptCCSP_Self_Domain_6.ppt
CCSP_Self_Domain_6.ppt
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Legal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information SecurityLegal, Ethical and professional issues in Information Security
Legal, Ethical and professional issues in Information Security
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protectionsCybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protections
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 

Mehr von stuimrozsm

An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use them
stuimrozsm
 
Improving IT application services with six sigma
Improving IT application services with six sigmaImproving IT application services with six sigma
Improving IT application services with six sigma
stuimrozsm
 
Factors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforceFactors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforce
stuimrozsm
 
Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...
stuimrozsm
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
stuimrozsm
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
stuimrozsm
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
stuimrozsm
 

Mehr von stuimrozsm (7)

An analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use themAn analysis of steganographic techniques and terrorists can use them
An analysis of steganographic techniques and terrorists can use them
 
Improving IT application services with six sigma
Improving IT application services with six sigmaImproving IT application services with six sigma
Improving IT application services with six sigma
 
Factors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforceFactors affecting advancement of diverse information technology workforce
Factors affecting advancement of diverse information technology workforce
 
Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...Article review - "Sometimes the dragon wins: A perspective on information-age...
Article review - "Sometimes the dragon wins: A perspective on information-age...
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 

Information security legislation

  • 1. Information Security Legislation “ A Practical Guide to Security Assessments” By Sudhanshu Kairab (Chapter 10) Sohel Imroz 4/4/2006
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.