Legal, Ethical, and Professional Issues in Information Security

Slides:



Advertisements
Similar presentations
Law & Ethics, Policies & Guidelines, and Security Awareness
Advertisements

Principles of Information Security, 3rd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Legal and Ethical Issues: Privacy and Security Chapter Five.
In civilized life, law floats in a sea of ethics.
Principles of Information Security, 3rd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
DHS, National Cyber Security Division Overview
Chapter 29 Ethics in Accounting
Information Security Policies Larry Conrad September 29, 2009.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Legal, Ethical, and Professional Issues In Information Security.
Legal, Ethical, and Professional Issues in Information Security
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Using the UN Convention against Corruption as a Basis for Good Governance.
NASPA Conference March 28, 2004 Presented by: Carole W. Middlebrooks University of Georgia.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Management of Information Security Chapter 11 Law And Ethics
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Principles of Information Security, Fifth Edition
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 5 HIPAA Enforcement HIPAA for Allied Health Careers.
Principles of Information Security, Fourth Edition
Importance of Intellectual Property Central issue in multilateral trade relations –Need for organization to see that there are intellectual property procedures.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Other Laws (Primarily for E-Government) COEN 351.
Home. Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.Glencoe Accounting The accounting profession requires its members to follow a.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Principles of Information Security, 2nd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Information Sharing Challenges, Trends and Opportunities
Lecture 11: Law and Ethics
Principles of Information Security, 2nd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Environmental Management System Definitions
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 13 Evaluating Corporate Ethics Understanding Business Ethics Stanwick.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
Chapter 4: Laws, Regulations, and Compliance
Federalism in Law Enforcement Intro to LPSCS 1. Federal and State Law Enforcement Agencies County State Federal Municipal Different Governments Different.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Copyright © 2008 Delmar Learning Chapter 7 Legal Issues.
Chapter 26 International Law and Global Commerce Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
Legal and Professional Issues In Information Security.
Michelle Forrest JD Candidate, Santa Clara University School of Law
Crown capital management international relations International Affairs.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Criminal Justice Today CHAPTER Criminal Justice Today, 13th Edition Frank Schmalleger Copyright © 2015, © 2013 by Pearson Education, Inc. All Rights Reserved.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Principles of Information Security, Fourth Edition
The accounting profession requires its members to follow a code of ethics.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fifth Edition
Categories of Law.
Chapter # 1 Overview of Ethics
Professional Codes of Ethics
Chapter 1: Policing in America
Bob Siegel President Privacy Ref, Inc.
Principles of Information Security, Fifth Edition
NPHS 1510 Federal and International
Legal, Ethical, and Professional Issues in Information Security Principles of Information Security Chapter 3.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Presentation transcript:

Legal, Ethical, and Professional Issues in Information Security Chapter 3

Law and Ethics in Information Security Laws Rules that mandate or prohibit certain behavior Drawn from ethics Ethics Define socially acceptable behaviors Key difference Laws carry the authority of a governing body Ethics do not carry the authority of a governing body Based on cultural mores Fixed moral attitudes or customs Some ethics standards are universal

Organizational Liability and the Need for Counsel Legal obligation of organization Extends beyond criminal or contract law Include legal obligation to restitution Employee acting with or without the authorization performs and illegal or unethical act that causes some degree of harm Employer can be held financially liable Due care Organization makes sure that every employee knows what is acceptable or unacceptable Knows the consequences of illegal or unethical actions

Organizational Liability and the Need for Counsel Due diligence Requires Make a valid effort to protect others Maintains the effort Jurisdiction Court’s right to hear a case if a wrong is committed Term – long arm Extends across the country or around the world

Policy Versus law Policies Difference between policy and law Guidelines that describe acceptable and unacceptable employee behaviors Functions as organizational laws Has penalties, judicial practices, and sanctions Difference between policy and law Ignorance of policy is acceptable Ignorance of law is unacceptable Keys for a policy to be enforceable Dissemination Review Comprehension Compliance Uniform enforcement

Types of Law Civil – govern a nation or state Criminal – addresses activities and conduct harmful to public Private – encompasses family, commercial, labor, and regulates the relationship between individuals and organizations Public – regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments

International Laws and Legal Bodies Organizations do business on the Internet – they do business globally Professionals must be sensitive to the laws and ethical values of many different cultures, societies, and countries Few international laws relating to privacy and informational security International laws are limited in their enforceablity

Council of Europe Convention on Cybercrime International task force Designed to oversee range of security functions Designed to standardized technology laws across international borders Attempts to improve the effectiveness of international investigations into breaches of technology law Concern raised by those concerned with freedom of speech and civil liberties Overall goal Simplify the acquisition of information for law enforcement agencies in certain types of international crimes

Agreement on Trade-Related Aspects of Intellectual Property Rights Created by the World Trade Organization Introduced intellectual property rules into the multilateral trade system First significant international effort to protect intellectual property rights

Agreement on Trade-Related Aspects of Intellectual Property Rights Covers five issues How basic principles of the trading system and other international intellectual property agreements should be applied How to give adequate protection to intellectual property rights How countries should enforce those rights adequately in their own territories How to settle disputes on intellectual property between members of the WTO Special transitional arrangements during the period when the new system is being introuced

Digital Millennium Copyright Act American contribution to WTO Plan to reduce the impact of copyright, trademark, and privacy infringement United Kingdom has implemented a version Database Right

DMCA Provisions Prohibits the circumvention protections and countermeasures implemented by copyright owners to control access to protected content Prohibits the manufacture of devices to circumvent protections and countermeasures that control access to protected content Bans trafficking in devices manufactured to circumvent protections and countermeasures that control access to protected content Prohibits the altering of information attached or imbedded into copyrighted material Excludes Internet service providers from certain forms of contributory copyright infringement

Major IT Professional Organizations Association of Computing Machinery “World’s first educational and scientific computing society” Strongly promotes education Provides discounts for student members International Information Systems Security Certification Consortium, Inc. (ISC)2 Nonprofit organization Focuses on the development and implementation of information security certifications and credentials Manages a body of knowledge on information security Administers and evaluated examinations for information security certifications

Major IT Professional Organizations Information Systems Audit and Control Association Focuses on auditing, control, and security Membership includes technical and managerial professionals Does not focus exclusively on information security Has many information security components Information Systems Security Associations (ISSA) Nonprofit society of information security professionals Mission – bring together qualified information security practioners Information exchange Education development Focus – “promoting management practices that will ensure the confidentiality, integrity, and availability of organizational information resources”

Major IT Professional Organizations Systems Administration, Networking, and Security Institute (SANS) Professional research and education cooperative Current membership > 156,000 Security professionals Auditors System administrators Network administrators Offers set of certifications

Federal Agencies Department of Homeland Security Five directorates or divisions Mission – protecting the people as well as the physical and informational assets of the United States Directorate of Information and Infrastructure Creates and enhances resources used to discover and responds to attacks on national information systems and critical infrastructure Directorate of Science and Technology Research and development activities in support of homeland defense Examination of vulnerabilities Sponsors emerging best practices

Federal Agencies National InfraGard Program Each FBI office establishes a chapter Collaborates with public and private organizations and academia Serves members in 4 ways Maintains an intrusion alert network using encrypted e-mail Maintains a secure Web site for communication about suspicious activity or intrusions Sponsors local chapter activities Operates a help desk for questions Contribution – free exchange of information to and from the private sector in the areas of threats and attacks on information resources

Federal Agencies National Security Agency (NSA) U. S. Secret Service “the nation’s cryptologic organization. It coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information… It is also one of the most important centers of foreign language analysis and research within the Government.” U. S. Secret Service Located in Department of the Treasury Charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes.