Legal and Professional Issues In Information Security.

Slides:



Advertisements
Similar presentations
Law & Ethics, Policies & Guidelines, and Security Awareness
Advertisements

WRSU Customer Service The Beauty of Change. Privacy and Confidentiality.
Information Technology as a Profession
PHARMACIST CODE OF ETHICS
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
ICT Ethics 2 ICT 139.
Legal and Ethical Issues: Privacy and Security Chapter Five.
In civilized life, law floats in a sea of ethics.
Principles of Information Security, 3rd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Staying Out of Prison in the Information Economy.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
5/21/2015 (1) Complying with P2P Mandates in the HEOA of 2008 EDUCAUSE Live! 23 November 2009
Legal, Ethical, and Professional Issues in Information Security
Hands-On Ethical Hacking and Network Defense
CS CS 5150: Software Engineering Lecture 5 Legal Aspects of Software Engineering 1.
Legal, Ethical, and Professional Issues In Information Security.
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Professional Codes of Ethics Professionalism and Codes of Ethics.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Legal, Ethical & Professional Issues
Principles of Information Security, Fourth Edition
An Educational Computer Based Training Program CBTCBT.
What’s in it for Me?. Recognition Program The Recognition Program requires extra work on the part of a Department. Why do we need to do it???
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 11 The Instructional.
Electronic Use Policies.   Social Media  Internet.
Business Law with UCC Applications,13e
Purchasing Ethics and Vendor Relations
Management of Information Security, 4th Edition
1-1Copyright © Houghton Mifflin Company Business Ethics Ethical Decision Making and Cases 4 th Edition Ferrell, Fraedrich, Ferrell Yousef Y. Alyazji (MBA)
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Principles of Information Security, 2nd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
1 CS 501 Spring 2002 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Lecture 11: Law and Ethics
Principles of Information Security, 2nd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Crosswalk of Public Health Accreditation and the Public Health Code of Ethics Highlighted items relate to the Water Supply case studied discussed in the.
Environmental Management System Definitions
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Ethics in pharmacy practice
CS CS 5150: Software Engineering Lecture 6 Legal Aspects of Software Engineering 2.
 the study of the rightness or wrongness of human conduct.  In any situation involving two or more individuals, values may come into conflict and ethical.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Copyright © 2012 Brooks/Cole, a division of Cengage Learning, Inc. Professional Concerns Chapter Nine.
Ethics.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Copyright © 2004 Pearson Education, Inc. Slide 9-1 Chapter 9 Ethical, Social, and Political Issues in E-commerce.
Principles of LPSCS. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission. Copyright.
CHAPTER ONE ETHICS MUSOLINO SUNY CRIMINAL & BUSINESS LAW.
{ Ethics Vocabulary.  Beneficence: − Means being beneficial; health care workers have an obligation to benefit the patient through both medical intervention.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
Basic Principles: Ethics and Business
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
Copyright © 2008 Delmar Learning Chapter 7 Legal Issues.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Legal, Ethical, and Professional Issues in Information Security
MGMT 452 Corporate Social Responsibility
Chapter # 1 Overview of Ethics
Professional Codes of Ethics
Munich Intellectual Property Law Center (MIPLC)
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Understand ethics and ethical decision-making.
Understand ethics and ethical decision-making.
CS-480b Network Security Dick Steflik
Presentation transcript:

Legal and Professional Issues In Information Security

Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To minimize liabilities/reduce risks, the information security practitioner must:  Understand current legal environment  Stay current with laws and regulations  Watch for new issues that emerge

Life for Computer Professionals  Binary  Problem solutions either work or not. Little room for gray areas.  Physical and mathematical laws ultimate authority when disputes arise  Guiding Philosophy - “Tell me what you need and I will create a system with appropriate trade-offs at least cost to solve your problem.”

When Worlds Collide...  Legal community always behind the technology curve  As a result, analogies often made between new technological paradigms and old world systems - some more easily defended than others.  Different interpretations would result in different laws

Patents  Competing products must use different method for achieving same task to avoid payments  Definite lifespan beyond which patent information freely available for use by the public

Copyright  Specific work  Automatically held when work is created, but easier to defend if it is registered  Definite lifetime beyond which the work is freely available to the public

Trademark  Specific name or phrase  Generic terms cannot be trademarked  Trademarks can be lost if they are not defended  Lost trademarks: aspirin, kleenex  Held Trademarks: Coke, Pepsi

ISP Liability  What is an Internet Service Provider Like?  Phone Company: Route information flows between individuals  Newspaper: Package content for distribution in a public forum  Answer determines ISP’s legal liability  The rules have been in a constant state of flux in recent years

Modern Era Communications Decency Act  ISP may monitor user activity (according to policy)  If statement to the effect that ISP does not take responsibility for user traffic in place then no ISP liability, BUT  Area for complaints must be available  Complaint response must happen in a timely fashion

DMCA  Digital Millennium Copyright Act  If a copyright infringement is claimed a web site must be taken down (however tenuous the claim may be)  Web site can only be reinstated after an appeals process.

Near Future?...  ISP’s may be required to monitor user traffic with a 40 day data-log.  ISP’s not explicitly exempt from liability  Hacker/Security Tools Illegal  Citizens must provide passwords for data seized by police

Privacy in the Workplace  Test for employers/employees - “Do you have a reasonable expectation of privacy?”  A case can be made that private on business machines still private, but this is not the law  Work-related material on business machines is definitely not private

Privacy in  Legally, is like a postal letter  Expectation of privacy in transit  Mail loses its special protected status once it leaves the letter carrier's grasp  For ,  Expectation of privacy while signal travels over Internet  loses its protected status at the mail server whether you have read it or not

Business  Electronic Communications Privacy Act (1986) says all business communication belongs to that business  Deleting can be ruled spoliation (intentionally destroying company records)  Archive worthless if it cannot be indexed effectively (in effect, saving everything can be equivalent to saving nothing)

What about Privacy at Home?  A lot of public information is considered private.  An increasing amount of public information available on the Internet  Reverse phone lookups  Campaign Contributions  Housing prices  Driver’s license information and photographs

Data Collection  Data collection has few boundaries

Jurisdiction  “The Internet has no boundaries”  Is that really true?  If you break a law in Finland, but you were on the Internet in the United States, what happens to you?  What if you are in California and you break a law in Japan?

E-Commerce Big Questions  Did you sell an illegal item to a resident of community X?  Did you try to stop the flow of illegal sales into X?

Law and Ethics in Information Security  Laws: rules that mandate or prohibit certain societal behavior  Ethics: define socially acceptable behavior  Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these  Laws carry sanctions of a governing authority; ethics do not

Types of Law  Civil  Criminal  Tort (Wrongful)  Private  Public

Policy Versus Law  Most organizations develop and formalize a body of expectations called policy  Policies serve as organizational laws  To be enforceable, policy must be distributed, readily available, easily understood, and acknowledged by employees

Association of Computing Machinery (ACM)  ACM established in 1947 as “the world's first educational and scientific computing society”  Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others’ privacy, and respecting others’ intellectual property

International Information Systems Security Certification Consortium, Inc. (ISC) 2  Non-profit organization focusing on development and implementation of information security certifications and credentials  Code primarily designed for information security professionals who have certification from (ISC) 2  Code of ethics focuses on four mandatory canons

System Administration, Networking, and Security Institute (SANS)  Professional organization with a large membership dedicated to protection of information and systems  SANS offers set of certifications called Global Information Assurance Certification (GIAC)

Information Systems Audit and Control Association (ISACA)  Professional association with focus on auditing, control, and security  Concentrates on providing IT control practices and standards  ISACA has code of ethics for its professionals

Computer Security Institute (CSI)  Provides information and training to support computer, networking, and information security professionals  Though without a code of ethics, has argued for adoption of ethical behavior among information security professionals

Information Systems Security Association (ISSA)  Nonprofit society of information security (IS) professionals  Primary mission to bring together qualified IS practitioners for information exchange and educational development  Promotes code of ethics similar to (ISC) 2, ISACA and ACM

Other Security Organizations  Internet Society (ISOC): promotes development and implementation of education, standards, policy and education to promote the Internet  Computer Security Division (CSD): division of National Institute for Standards and Technology (NIST); promotes industry best practices and is important reference for information security professionals

Other Security Organizations (continued)  CERT Coordination Center (CERT/CC): center of Internet security expertise operated by Carnegie Mellon University  Computer Professionals for Social Responsibility (CPSR): public organization for anyone concerned with impact of computer technology on society

Organizational Liability and the Need for Counsel  Liability is legal obligation of an entity; includes legal obligation to make restitution for wrongs committed  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that an organization make valid effort to protect others and continually maintain that level of effort

Summary  Laws: rules that mandate or prohibit certain behavior in society; drawn from ethics  Ethics: define socially acceptable behaviors; based on cultural mores (fixed moral attitudes or customs of a particular group)  Types of law: civil, criminal, tort law, private, public

Summary  Many organizations have codes of conduct and/or codes of ethics  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that organization make valid effort to protect others and continually maintain that effort