Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Laws: rules that mandate or prohibit certain societal Common techniques include logon banners which

behavior require a specific action (mouse click or keystroke) to


Ethics: define socially acceptable behavior acknowledge agreement, or a signed document clearly
Cultural mores: fixed moral attitudes or customs of a indicating the employee has read, understood, and
particular group; ethics based on these agreed to comply with the policy.
 Laws carry sanctions of a governing authority; –Uniform enforcement – The organization must be
ethics do not able to demonstrate that the policy has been
uniformly enforced, regardless of employee status or
Organizational Liability and the Need for Counsel assignment.
(LRDDJL)
 Liability: legal obligation of an entity Types of Law (CCPP)
extending beyond criminal or contract law; • Civil: governs nation or state; manages
includes legal obligation to make restitution relationships/conflicts between organizational
 Restitution: to compensate for wrongs entities and people.
committed by an organization or its • Criminal: addresses violations harmful to
employees society; actively enforced by the state
 Due care: insuring that employees know what • Private: regulates relationships between
constitutes acceptable behavior and know the individuals and organizations.
consequences of illegal or unethical actions • Public: regulates structure/administration of
 Due diligence: making a valid effort to protect government agencies and relationships with
others; continually maintaining level of effort citizens, employees, and other governments
 Jurisdiction: court's right to hear a case if the
wrong was committed in its territory or Civil Cases
involved its citizenry • According to the Michigan Association of Townships,
 Long arm jurisdiction: right of any court to “If you decide to sue another person, an organization
impose its authority over an individual or or a business, your case is a civil case. Private
organization if it can establish jurisdiction individuals, businesses or the government can sue
other people and organizations. The person who is
Policy versus Law suing is called the plaintiff and the person who is
• Policies: body of expectations that describe being sued is called the defendant. Some examples of
acceptable and unacceptable employee behaviors in civil cases are:
the workplace  A person who is hurt in a car accident sues
• Policies function as laws within an organization; the driver of the other car;
must be crafted carefully to ensure they are complete, • A worker sues his employer after the worker
appropriate, fairly applied to everyone hurts his back at work and can never work
• Difference between policy and law: ignorance of a again;
policy is an acceptable defense • A homeowner who has hired a builder to
Criteria for policy enforcement: (DRCCU) build a new kitchen sues the builder when the
– Dissemination (distribution) - – The organization kitchen is badly built and has to be fixed;
must be able to demonstrate that the relevant policy • A family sues their doctor when the doctor
has been made readily available for review by the does not discover that the mother has cancer
employee. Common dissemination techniques include in time for the cancer to be treated.
hard copy and electronic distribution. Criminal Cases (MRTRK)
– Review (reading) - The organization must be able to • Murder.
demonstrate that it disseminated the document in an • Robbery.
intelligible form, including versions for illiterate, • Treason.
nonEnglish reading, and reading-impaired employees. • Rape.
Common techniques include recordings of the policy • Kidnapping.
in English and alternate languages. Private cases
–Comprehension (understanding) - – The organization • Divorce and Infidelity Investigations. The end
must be able to demonstrate that the employee of a marriage often involves the loss of trust
understood the requirements and content of the between spouses. ...
policy. Common techniques include quizzes and other • Child Custody Disputes. ...
assessments • Finding Missing Loved Ones. ...
– Compliance (agreement) - – The organization must • Serving Legal Papers. ...
be able to demonstrate that the employee agrees to • Trial Preparation. ...
comply with the policy, through act or affirmation. • Social Media Investigations. ...
• Background Investigations. • Ability to aggregate data from multiple sources
Relevant U.S. Laws allows creation of information databases previously
• United States has been a leader in the development impossible
and implementation of information security legislation • The number of statutes addressing an individual’s
• Implementation of information security legislation right to privacy has grown
contributes to a more reliable business environment • the state or condition of being free from being
and a stable economy observed or disturbed by other people
• U.S. has demonstrated understanding of problems
facing the information security field; has specified US Regulations
penalties for individuals and organizations failing to – Privacy of Customer Information Section of the
follow requirements set forth in U.S. civil statutes common carrier regulation
– Federal Privacy Act of 1974
General Computer Crime Laws – Electronic Communications Privacy Act of 1986
• Computer Fraud and Abuse Act of 1986 (CFA Act): – Health Insurance Portability and Accountability Act
cornerstone of many computer-related federal laws of 1996 (HIPAA), aka Kennedy-Kassebaum Act
and enforcement efforts – Financial Services Modernization Act, or
– The CFAA prohibits intentionally accessing a GrammLeach-Bliley Act of 1999
computer without authorization or in excess of
authorization, but fails to define what “without Identity Theft
authorization” means. – Federal Trade Commission: “occurring when
 National Information Infrastructure Protection someone uses your personally identifying information,
Act of 1996 - Revises Federal criminal code like your name, Social Security number, or credit card
provisions regarding fraud and related activity in number, without your permission, to commit fraud or
connection with computers. Sets penalties with other crimes”
respect to anyone who having knowingly accessed – Fraud And Related Activity In Connection With
a computer without authorization or exceeding Identification Documents, Authentication Features,
authorized access, obtains specified restricted And Information (Title 18, U.S.C. § 1028)
information or data, and, with reason to believe If someone suspects identity theft
that such information could be used to the injury – Report to the three dominant consumer
of the United States or to the advantage of any reporting companies that your identity is
foreign nation, willfully communicates, delivers, or threatened
transmits it to any person not entitled to receive it – Account
(or causes or attempts such communication) • Close compromised account
• National Information Infrastructure Protection Act of • Dispute accounts opened without permission
1996: – Register your concern with the FTC
– Modified several sections of the previous act – Report the incident to either your local
and increased the penalties for selected police or police in the location where the
crimes identity theft occurred
– Severity of penalties judged on the purpose
• For purposes of commercial advantage Health Insurance Portability and Accountability Act
• For private financial gain of 1996 (HIPAA)
• In furtherance of a criminal act • Protects the confidentiality and security of health
 USA PATRIOT Act of 2001: provides law care data by establishing and enforcing standards and
enforcement agencies with broader latitude in by standardizing electronic data interchange
order to combat terrorism-related activities • Consumer control of medical information
• USA PATRIOT Improvement and Reauthorization • Boundaries on the use of medical information
Act: made permanent fourteen of the sixteen • Accountability for the privacy of private information
expanded powers of the Department of Homeland • Balance of public responsibility for the use of
Security and the FBI in investigating terrorist activity medical information for the greater good measured
• Computer Security Act of 1987: one of the first against impact to the individual
attempts to protect federal computer systems by • Security of health information
establishing minimum acceptable security practices
Privacy Export and Espionage Laws
• One of the hottest topics in information security • Economic Espionage Act of 1996 (EEA)
• Is a “state of being free from unsanctioned • Security And Freedom Through Encryption Act of
intrusion” - lacking effective or authoritative approval 1999 (SAFE)
or consent • The acts include provisions about encryption that:
– Reinforce the right to use or sell encryption • Penalties for noncompliance range from fines to jail
algorithms, without concern of key terms
registration • Reliability assurance will require additional emphasis
– Prohibit the federal government from on confidentiality and integrity
requiring it Freedom of Information Act of 1966 (FOIA)
– Make it not probable cause in criminal • Allows access to federal agency records or
activity information not determined to be matter of national
– Relax export restrictions security
– Additional penalties for using it in a crime • U.S. government agencies required to disclose any
Economic Espionage Act of 1996 (EEA) requested information upon receipt of written request
• Economic espionage is the unlawful or clandestine • Some information protected from disclosure
targeting or acquisition of sensitive financial, trade or State and Local Regulations
economic policy information; proprietary economic • Restrictions on organizational computer technology
information; or technological information. use exist at international, national, state, local levels
• An Act to punish acts of interference with the • Information security professional responsible for
foreign relations, and the foreign commerce of the understanding state regulations and ensuring
United States, to punish espionage, and better to organization is compliant with regulations
enforce the criminal laws of the United States, and for International Laws and Legal Bodies
other purposes. • When organizations do business on the Internet,
Security and Freedom Through Encryption (SAFE) Act they do business globally
• Establishes in the Department of Justice (DOJ) a • Professionals must be sensitive to laws and ethical
National Electronic Technologies (NET) Center to: values of many different cultures, societies, and
(1) serve as a center for Federal, State, and local law countries
enforcement authorities for information and • Because of political complexities of relationships
assistance regarding decryption and other access among nations and differences in culture, there are
requirements and for industry and Government few international laws relating to privacy and
entities to exchange information and methodology information security
regarding information security techniques and • These international laws are important but are
technologies; limited in their enforceability
(2) examine encryption techniques and methods to European Council Cyber-Crime Convention
facilitate the ability of law enforcement to gain • Establishes international task force overseeing
efficient access to plaintext of communications and Internet security functions for standardized
electronic information; international technology laws
(3) develop efficient methods and improve the • Attempts to improve effectiveness of international
efficiency of existing methods of accessing such investigations into breaches of technology law
plaintext; • Well received by intellectual property rights
(4) investigate techniques and technologies to advocates due to emphasis on copyright infringement
facilitate access to communications and electronic prosecution
information; and • Lacks realistic provisions for enforcement
(5) obtain information regarding the most current Agreement on Trade-Related Aspects of Intellectual
hardware, software, telecommunications, and other Property Rights
capabilities to understand how to access information • Created by World Trade Organization (WTO)
transmitted across networks. • First significant international effort to protect
U.S. Copyright Law intellectual property rights
• Intellectual property recognized as protected asset • Outlines requirements for governmental oversight
in the U.S.; copyright law extends to electronic and legislation providing minimum levels of protection
formats for intellectual property
• With proper acknowledgment, permissible to Agreement covers five issues:
include portions of others’ work as reference – Application of basic principles of trading system and
• U.S. Copyright Office Web site: www.copyright.gov international intellectual property agreements
Financial Reporting – Giving adequate protection to intellectual property
• Sarbanes-Oxley Act of 2002 rights
• Affects executive management of publicly traded – Enforcement of those rights by countries in their
corporations and public accounting firms own territories
• Seeks to improve reliability and accuracy of financial – Settling intellectual property disputes
reporting and increase the accountability of corporate – Transitional arrangements while new system is being
governance introduced
Ethics and Information Security  International Information Systems Security
• Many Professional groups have explicit rules Certification Consortium, Inc. (ISC)2
governing ethical behavior in the workplace – Nonprofit organization focusing on development
• IT and IT security do not have binding codes of and implementation of information security
ethics certifications and credentials
• Professional associations and certification agencies – Code primarily designed for information security
work to establish codes of ethics professionals who have certification from (ISC)2
– Can prescribe ethical conduct – Code of ethics focuses on four mandatory
– Do not always have the ability to ban canons
violators from practice in field  System Administration, Networking, and Security
Ethical Differences Across Cultures Institute (SANS)
• Cultural differences create difficulty in determining – Professional organization with a large
what is and is not ethical membership dedicated to protection of
• Difficulties arise when one nationality’s ethical information and systems
behavior conflicts with ethics of another national – SANS offers set of certifications called Global
group Information Assurance Certification (GIAC)
• Scenarios are grouped into:  Information Systems Audit and Control
– Software License Infringement Association (ISACA)
– Illicit Use – Professional association with focus on auditing,
– Misuse of Corporate Resources control, and security
• Cultures have different views on the scenarios – Concentrates on providing IT control practices
Ethics and Education and standards
• Overriding factor in levelling ethical perceptions – ISACA has code of ethics for its professionals
within a small population is education Information Systems Security Association (ISSA)
• Employees must be trained in expected behaviors of – Nonprofit society of information security (IS)
an ethical employee, especially in areas of information professionals
security – Primary mission to bring together qualified IS
• Proper ethical training is vital to creating informed, practitioners for information exchange and
well prepared, and low-risk system user educational development
Deterring Unethical and Illegal Behavior – Promotes code of ethics similar to (ISC)2, ISACA,
• Three general causes of unethical and illegal and ACM
behavior: ignorance, accident, intent
• Deterrence: best method for preventing an illegal or Key U.S. Federal Agencies (DFNU)
unethical activity; e.g., laws, policies, technical • Department of Homeland Security (DHS)
controls – Made up of five directorates, or divisions
• Laws and policies only deter if three conditions are – Mission is to protect the people as well as
present: the physical and informational assets of the
– Fear of penalty US
– Probability of being caught • Federal Bureau of Investigation’s National InfraGard
– Probability of penalty being administered Program
Codes of Ethics and Professional Organizations – Maintains an intrusion alert network
• Several professional organizations have established – Maintains a secure Web site for
codes of conduct/ethics communication about suspicious activity or
• Codes of ethics can have positive effect; intrusions
unfortunately, many employers do not encourage – Sponsors local chapter activities
joining these professional organizations – Operates a help desk for questions
• Responsibility of security professionals to act  National Security Agency (NSA)
ethically and according to policies of employer, – Is the Nation’s cryptologic organization
professional organization, and laws of society – Protects US information systems
Major IT Professional Organizations (AISI) – Produces foreign intelligence information
• Association of Computing Machinery (ACM) – Responsible for signal intelligence and
– Established in 1947 as “the world's first information system security
educational and scientific computing society” • U.S. Secret Service
– Code of ethics contains references to – In addition to protective services, charged with the
protecting information confidentiality, causing detection and arrest of persons committing a federal
no harm, protecting others’ privacy, and office relating to computer fraud or false identification
respecting others’ intellectual property

You might also like