Legal, Ethical, and Professional Issues in Information Security

Slides:



Advertisements
Similar presentations
Law & Ethics, Policies & Guidelines, and Security Awareness
Advertisements

Principles of Information Security, 3rd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Confidentiality and HIPAA
HIPAA Privacy Rule Training
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
In civilized life, law floats in a sea of ethics.
Principles of Information Security, 3rd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Legal, Ethical, and Professional Issues in Information Security
Law for Business and Personal Use
Chapter 29 Ethics in Accounting
Security Controls – What Works
Information Systems Security Officer
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Legal, Ethical, and Professional Issues In Information Security.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Economics, Ethics and Markets
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Internal Auditing and Outsourcing
Chapter Two Ethical & Legal Issues.
Management of Information Security Chapter 11 Law And Ethics
Principles of Information Security, Fifth Edition
Principles of Information Security, Fourth Edition
HIPAA PRIVACY AND SECURITY AWARENESS.
HROFFICE USER CONFERENCE 2005 Creating an Effective Ethics and Compliance Program Ascentis User Group September, 2005.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
Developing an Effective Ethics Program
Management of Information Security, 4th Edition
Agency Risk Management & Internal Control Standards (ARMICS)
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
The Institutionalization of Business Ethics
Principles of Information Security, 2nd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
Lecture 11: Law and Ethics
Principles of Information Security, 2nd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter 2 - Ethics for IT Professionals and IT Users1 Ethics for IT Professionals and IT Users 2 Chapter.
Categories of Law. The Law The broadest categories of law are International Law and Domestic Law.
Chapter 4: Laws, Regulations, and Compliance
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
 Health Insurance and Accountability Act Cornelius Villalon Jr.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Legal and Professional Issues In Information Security.
Karly Stinedurf.  What is Ethics?  The Ten Commandments of Computer Ethics  Frameworks/Standards of Ethics  Ethics and Education  Deterring Unethical.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Legal, Ethical, and Professional Issues in Information Security
Principles of Information Security, Fourth Edition
Health Insurance Portability and Accountability Act of 1996
Privacy and the Law.
Legal and Ethical Dimensions of Sport Public Relations
Principles of Information Security, Fourth Edition
Lecture 11 Legal and Ethical Aspects
Categories of Law.
Chapter 8 Developing an Effective Ethics Program
Legal, Ethical, and Professional Issues in Information Security Principles of Information Security Chapter 3.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
CS-480b Network Security Dick Steflik
Presentation transcript:

Legal, Ethical, and Professional Issues in Information Security Principles of Information Security Chapter 3

Chapter Objectives Upon completion of this chapter you should be able to: Use this chapter as a guide for future reference on laws, regulations, and professional organizations. Differentiate between laws and ethics. Identify major national laws that relate to the practice of information security. Describe the role of culture as it applies to ethics in information security.

*Law and Ethics in Information Security Jean-Jacques Rousseau The Social Contract or Principles of Political Right (1762) "The rules the members of a society create to balance the right of the individual to self-determination with the needs of the society as a whole are called laws." Laws** Rules that mandate or prohibit certain behavior in society. Carry the sanctions of governing authority. Ethics** Define socially acceptable behaviors. Universally recognized examples include murder, theft, assault, and arson. Cultural Mores The fixed moral attitudes or customs of a particular group.

Organizational Liability Legal obligation of an entity that extends beyond criminal or contract law. Includes obligation to make restitution, or compensate for, wrongs committed by an organization or its employees. Organization can be held financially liable (responsible) for actions of employees. Obligation increases if organization fails to take due care.

Organizational Responsibilities for Due Care and Due Diligence Must ensure that every employee knows what is acceptable or unacceptable behavior consequences of illegal or unethical actions. Due diligence** Requires organization to make a valid effort to protect others continually maintain this level of effort Internet has global reach --- injury/wrong can occur anywhere in the world. Jurisdiction** A court's right to hear a case if a wrong was committed in its territory, or involves its citizenry --- long arm jurisdiction. In U.S., any court can impose its authority over individuals or organizations, if it can establish jurisdiction

Policy vs Law Laws External legal requirements Security policies**. Internal (organizational) rules that: Describe acceptable and unacceptable employee behaviors. Organizational laws --- including penalties and sanctions. Must be complete, appropriate and fairly applied in the work place. In order to be enforceable, policies must be Disseminated. Distributed to all individuals and readily available for employee reference. Reviewed. Document distributed in a format that could be read by employeees. Comprehended. Employees understand the requirements --- e.g., quizzes or other methods of assessment. Compliance. Employee agrees to comply with the policy. Uniformly enforced, regardless of employee status or assignment.

Types of Law Civil law** Criminal law** Private law** Public law** Laws that govern a nation or state. Criminal law** Violations harmful to society Actively enforced by prosecution by the state. Private law** regulates relationship between individual and organization. encompasses family law, commercial law, labor law. Public law** regulates structure and administration of government agencies and their relationships with citizens, employees, and other governments, providing careful checks and balances. Includes criminal, administrative and constitutional law.

U.S. General Computer Crime Laws Computer Fraud and Abuse Act of 1986 (CFA Act)** Cornerstone of federal laws and enforcement acts Addresses threats to computers Communications Act of 1934 Addresses Telecommunications modified by Telecommunications Deregulation and Competition Act of 1996 modernize archaic terminology Computer Security Act of 1987** Protect federal computer systems (federal agencies) Establish minimum acceptable security practices.

U.S. Privacy Laws Privacy Issues Privacy of Customer Information Collection of personal information Clipper chip - never implemented Privacy of Customer Information U.S. Legal Code Privacy of Customer Information Section Responsibilities of common carriers (phone co) to protect confidentiality Federal Privacy Act of 1974** Regulates government protection of privacy, with some exceptions Electronic Communications Privacy Act of 1986** Fourth Amendment - unlawful search and seizure Health Insurance Portability and Accountability Act of 1996 (HIPAA)** Kennedy-Kassebaum Act Privacy of electronic data interchange for health care data Financial Services Modernization Act (1999)** Gramm-Leach-Bliley Act of 1999 Banks, securities firms, and insurance companies - disclosure of privacy policies

U.S. Copyright Law** Recognizes intellectual property as a protected asset in the U.S. published word, including electronic formats Fair use of copyrighted materials Includes support news reporting teaching scholarship related activities Use MUST be for educational or library purposes not for profit not excessive include proper acknowledgment to original author

Financial Reporting Sarbanes-Oxley Act of 2002** Affects publicly traded corporations public accounting firms result of Enron, among others. improve reliability and accuracy of financial reporting. increase accountability of corporate governance in publicly traded companies. Executives will need assurance on reliability and quality of information systems from information technology managers. Key issue: compliance with reporting requirements.

Freedom of Information Act of 1996 (FOIA)** Any person may request access to federal agency records or information not determined to be a matter of national security. Agencies must disclose requested information After the request has been reviewed and determined not to pose a risk to national security. Does NOT apply to: state/local government agencies private businesses or individuals.

State and Local Regulations Locally implemented laws pertaining to information security. Information security professionals must be aware of these laws and comply with them.

International Laws and Legal Bodies Few international laws relating to privacy and information security. European Council Cyper-Crime Convention 2001. Creates international task force Improve effectiveness of international investigations Emphasis on copyright infringement prosecution Lacks realistic provisions for enforcement WTO Agreement on Intellectual Property Rights Intellectual property rules for multilateral trade system. Digital Millenium Copyright Act** U.S. response to 1995 Directive 95/46/EC by E.U. U.K. Database Right United Nations Charter Information Warfare provisions.

Security Breaches Punishment If not caught: illegal to demand a payment in order to “disappear without a track” But banks and financial institutions have to keep it quiet… If caught in a “lawful” country: fines and/or jail sentence AOL employees http://www.connectedhomemag.com/HomeOffice/Articles/Index.cfm?ArticleID=43090 http://www.aolsucks.org/ccaol2.htm “$130 mil. stolen in computer crime. Each defendant faces the possibility of 35 years in prison, and more than $1 million in fines or twice the amount made from the crime, whichever is greater.” http://www.crime- research.org/news/27.08.2009/3750/ Malicious kids go to jail http://www.cybercrime.gov/cases.htm Kevin Mitnick and Robert Morris Federal cases database (only up to 2006) http://www.justice.gov/criminal/cybercrime/cccases.html

Ethics and Information Security Ethical issues of information security professionals Expected to be leaders in ethical workplace behavior No binding professional code of ethics Some professional organizations provide ethical codes of conduct, Have no authority to banish violators from professional practice.

Cultural Differences and Ethics Different nationalities have different perspectives on computer ethics Asian tradition - collective ownership Western tradition - intellectual property rights Study of computer use ethics among students in 9 nations Singapore, Hong Kong, U.S., England, Australia, Sweden, Wales, Netherlands Studied 3 categories of use software license infringement illicit use misuse of corporate resources

Cultural Differences: Software License Infringement Most nations had similar attitudes toward software piracy U.S. significantly less tolerant (least tolerant) Other countries moderate higher piracy rates in Singapore/Hong Kong may result from lack of legal disincentives or punitive measures Netherlands most permissive least likely to honor copyrights of content creators lower piracy rate than Singapore/Hong Kong

Cultural Differences: Illicit Use of Software Viruses, hacking, other forms of abuse uniformly condemned as unacceptable behavior. Singapore/Hong Kong most tolerant Sweden/Netherlands in-between U.S., Wales, England, Australia least tolerant

Cultural Differences: Misuse of Corporate Resources Generally lenient attitudes toward personal use of company computing resources. Singapore/Hong Kong viewed personal use as unethical (least tolerant) Other countries Personal use acceptable if not specifically prohibited Netherlands most lenient

Ethics and Education Education overriding factor in leveling the ethical perceptions within a small population Employees must be trained and kept aware of topics related to information security, including expected ethical behaviors.. Many employees may not have formal technical training to understand that their behavior is unethical or illegal. Ethical and legal training is an essential key to developing informed, well-prepared, and low-risk system users.

Deterrence to Unethical and Illegal Behavior Use policy, education, training, and technology to protect information systems. 3 categories of unethical and illegal behavior Ignorance No excuse for violating law, but allowable for policies. Use education, policies, training, awareness programs to keep individuals aware of policies. Accident Use careful planning and control to prevent accidental modifications to system and data. Intent Frequent cornerstone for prosecution. Best controls are litigation, prosecution, and technical controls.

Deterrence Best method to prevent illegal or unethical activity. Laws, policies, and technical controls 3 conditions required for effective deterrence Fear of penalty reprimand or warnings may not have the same effectiveness as imprisonment or loss of pay. Probability of being caught must believe there is a strong possibility of being caught. Probability of penalty being administered must believe the penalty will be administered Note: threats don’t work --- penalties must be realistic and enforceable.

Codes of Ethics Established by various professional organizations Produce a positive effect on judgment regarding computer use Establishes responsibility of security professionals to act ethically according to the policies and procedures of their employers, professional organizations, and laws of society. Organizations assume responsibility to develop, disseminate, and enforce policies.

Major IT Professional Organizations and Ethics Association for Computing Machinery (ACM) promotes education and provides discounts for students educational and scientific computing society International Information Systems Security Certification Consortium (ISC2) develops and implements information security certifications and credentials System Administration, Networking, and Security Institute (SANS) Global Information Assurance Certifications (GIAC) Information Systems Audit and Control Association (ISACA) focus on auditing, control and security Computer Security Institute (CSI) sponsors education and training for information security Information Systems Security Association (ISSA) information exchange and educational development for information security practitioners

Other Security Organizations Internet Society (ISOC) develop education, standards, policy, and education and training to promote the Internet Internet Engineering Task Force (IETF) develops Internet's technical foundations Computer Security Division (CSD) of National Institute for Standards and Technology (NIST) Computer Security Resource Center (CSRC) Computer Emergency Response Team (CERT)** CERT Coordination Center (CERT/CC) Carnegie Mellon University Software Engineering Institute Computer Professionals for Social Responsibility (CPSR) promotes ethical and responsible development and use of computing watchdog for development of ethical computing

U.S. Federal Agencies Related to Information Security Department of Homeland Security (DHS) Directorate of Information and Infrastructure discover and respond to attacks on national information systems and critical infrastructure research and development of software and technology Science and Technology Directorate Research and development activities examination of vulnerabilities sponsors emerging best practices FBI National Infrastructure Protection Center (NIPC) U.S. government center for threat assessment, warning, investigation, and response to threats or attacks against U.S. infrastructures National InfraGard Program cooperative effort between public and private organizations and academic community provides free exchange of information with private sector regarding threats and attacks.

U.S. Federal Agencies (2) National Security Agency (NSA)** U.S. cryptologic organization Centers of Excellence in Information Assurance Education recognition for universities/schools acknowledgment on NSA web site Program to certify curricula in information security Information Assurance Courseware Evaluation Provides 3 year accreditation U.S. Secret Service Part of Department of Treasury One mission is to detect and arrest any person committing U.S. federal offenses related to computer fraud and false identification crimes.