SlideShare a Scribd company logo
LEGAL, ETHICAL, AND PROFESSIONAL
ISSUES IN INFORMATION SECURITY
 Differentiate between laws and ethics
 Identify major national laws that relate to
the practice of information security
 Understand the role of culture as it applies
to ethics in information security
Objectives
INTRODUCTION
 You must understand scope of an
organization’s legal and ethical
responsibilities
 To minimize liabilities/reduce risks, the
information security practitioner must:
 Understand current legal environment
 Stay current with laws and regulations
 Watch for new issues that emerge
LAW AND ETHICS IN INFORMATION SECURITY
 Laws: rules that mandate or prohibit
certain societal behavior
 Ethics: define socially acceptable behavior
 Cultural mores: fixed moral attitudes or
customs of a particular group; ethics
based on these
 Laws carry sanctions of a governing
authority; ethics do not
TYPES OF LAW
 Civil
 Criminal
 Tort
 Private
 Public
RELEVANT U.S. LAWS (GENERAL)
 Computer Fraud and Abuse Act of 1986 (CFA
Act)
 National Information Infrastructure Protection Act
of 1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and
Competition Act
of 1996
 Communications Decency Act of 1996 (CDA)
 Computer Security Act of 1987
PRIVACY
 One of the hottest topics in information
security
 Is a “state of being free from unsanctioned
intrusion”
 Ability to aggregate data from multiple
sources allows creation of information
databases previously unheard of
PRIVACY OF CUSTOMER INFORMATION
 Privacy of Customer Information Section of
common carrier regulation
 Federal Privacy Act of 1974
 Electronic Communications Privacy Act of 1986
 Health Insurance Portability and Accountability
Act of 1996 (HIPAA), aka Kennedy-Kassebaum
Act
 Financial Services Modernization Act, or
Gramm-Leach-Bliley Act of 1999
EXPORT AND ESPIONAGE LAWS
 Economic Espionage Act of 1996 (EEA)
 Security And Freedom Through
Encryption Act of 1999 (SAFE)
U.S. COPYRIGHT LAW
 Intellectual property recognized as protected
asset in the U.S.; copyright law extends to
electronic formats
 With proper acknowledgement, permissible
to include portions of others’ work as
reference
 U.S. Copyright Office Web site:
www.copyright.gov
FREEDOM OF INFORMATION ACT OF 1966
(FOIA)
 Allows access to federal agency records
or information not determined to be matter
of national security
 U.S. government agencies required to
disclose any requested information upon
receipt of written request
 Some information protected from
disclosure
STATE AND LOCAL REGULATIONS
 Restrictions on organizational computer
technology use exist at international,
national, state, local levels
 Information security professional responsible
for understanding state regulations and
ensuring organization is compliant with
regulations
INTERNATIONAL LAWS AND LEGAL BODIES
 European Council Cyber-Crime Convention:
 Establishes international task force overseeing
Internet security functions for standardized
international
technology laws
 Attempts to improve effectiveness of international
investigations into breaches of technology law
 Well received by intellectual property rights
advocates due to emphasis on copyright
infringement prosecution
 Lacks realistic provisions for enforcement
DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)
 U.S. contribution to international effort to
reduce impact of copyright, trademark,
and privacy infringement
 A response to European Union Directive
95/46/EC, which adds protection to
individuals with regard to processing and
free movement of personal data
UNITED NATIONS CHARTER
 Makes provisions, to a degree, for
information security during information
warfare (IW)
 IW involves use of information technology to
conduct organized and lawful military
operations
 IW is relatively new type of warfare, although
military has been conducting electronic
warfare operations for decades
POLICY VERSUS LAW
 Most organizations develop and
formalize a body of expectations called
policy
 Policies serve as organizational laws
 To be enforceable, policy must be
distributed, readily available, easily
understood, and acknowledged by
employees
ETHICS AND INFORMATION SECURITY
ETHICAL DIFFERENCES ACROSS CULTURES
 Cultural differences create difficulty in
determining what is and is not ethical
 Difficulties arise when one nationality’s
ethical behavior conflicts with ethics of
another national group
 Example: many of ways in which Asian
cultures use computer technology is
software piracy
ETHICS AND EDUCATION
 Overriding factor in leveling ethical
perceptions within a small population is
education
 Employees must be trained in expected
behaviors of an ethical employee, especially
in areas of information security
 Proper ethical training vital to creating
informed, well prepared, and low-risk system
user
DETERRENCE TO UNETHICAL AND ILLEGAL
BEHAVIOR
 Deterrence: best method for preventing an
illegal or unethical activity; e.g., laws,
policies, technical controls
 Laws and policies only deter if three
conditions are present:
 Fear of penalty
 Probability of being caught
 Probability of penalty being administered
CODES OF ETHICS AND PROFESSIONAL
ORGANIZATIONS
 Several professional organizations have
established codes of conduct/ethics
 Codes of ethics can have positive effect;
unfortunately, many employers do not
encourage joining of these professional
organizations
 Responsibility of security professionals to act
ethically and according to policies of
employer, professional organization, and laws
of society
ASSOCIATION OF COMPUTING MACHINERY
(ACM)
 ACM established in 1947 as “the world's
first educational and scientific computing
society”
 Code of ethics contains references to
protecting information confidentiality,
causing no harm, protecting others’
privacy, and respecting others’ intellectual
property
INTERNATIONAL INFORMATION SYSTEMS
SECURITY CERTIFICATION CONSORTIUM, INC.
(ISC)2
 Non-profit organization focusing on development
and implementation of information security
certifications and credentials
 Code primarily designed for information security
professionals who have certification from (ISC)2
 Code of ethics focuses on four mandatory
canons
SYSTEM ADMINISTRATION, NETWORKING,
AND SECURITY INSTITUTE (SANS)
 Professional organization with a large
membership dedicated to protection of
information and systems
 SANS offers set of certifications called
Global Information Assurance Certification
(GIAC)
INFORMATION SYSTEMS AUDIT AND
CONTROL ASSOCIATION (ISACA)
 Professional association with focus on
auditing, control, and security
 Concentrates on providing IT control
practices and standards
 ISACA has code of ethics for its
professionals
COMPUTER SECURITY INSTITUTE (CSI)
 Provides information and training to support
computer, networking, and information
security professionals
 Though without a code of ethics, has argued
for adoption of ethical behavior among
information security professionals
INFORMATION SYSTEMS SECURITY
ASSOCIATION (ISSA)
 Nonprofit society of information security
(IS) professionals
 Primary mission to bring together qualified
IS practitioners for information exchange
and educational development
 Promotes code of ethics similar to (ISC)2,
ISACA and ACM
OTHER SECURITY ORGANIZATIONS
 Internet Society (ISOC): promotes
development and implementation of
education, standards, policy and education to
promote the Internet
 Computer Security Division (CSD): division of
National Institute for Standards and
Technology (NIST); promotes industry best
practices and is important reference for
information security professionals
OTHER SECURITY ORGANIZATIONS (CONTINUED)
 CERT Coordination Center (CERT/CC):
center of Internet security expertise
operated by Carnegie Mellon University
 Computer Professionals for Social
Responsibility (CPSR): public organization
for anyone concerned with impact of
computer technology on society
KEY U.S. FEDERAL AGENCIES
 Department of Homeland Security (DHS)
 Federal Bureau of Investigation’s National
Infrastructure Protection Center (NIPC)
 National Security Agency (NSA)
 U.S. Secret Service
ORGANIZATIONAL LIABILITY AND THE NEED
FOR COUNSEL
 Liability is legal obligation of an entity;
includes legal obligation to make restitution
for wrongs committed
 Organization increases liability if it refuses
to take measures known as due care
 Due diligence requires that an organization
make valid effort to protect others and
continually maintain that level of effort
SUMMARY
 Laws: rules that mandate or prohibit
certain behavior in society; drawn from
ethics
 Ethics: define socially acceptable
behaviors; based on cultural mores (fixed
moral attitudes or customs of a particular
group)
 Types of law: civil, criminal, tort law,
private, public
SUMMARY
 Relevant U.S. laws:
 Computer Fraud and Abuse Act of 1986 (CFA Act)
 National Information Infrastructure Protection Act of
1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and Competition
Act
of 1996
 Communications Decency Act of 1996 (CDA)
 Computer Security Act of 1987
SUMMARY
 Many organizations have codes of conduct and/or
codes of ethics
 Organization increases liability if it refuses to take
measures known as due care
 Due diligence requires that organization make valid
effort to protect others and continually maintain that
effort

More Related Content

What's hot

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
Zefren Edior
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
Dhani Ahmad
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
Saqib Raza
 
Information Security
Information SecurityInformation Security
Information Security
Dhilsath Fathima
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
Shujun Li
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
GulnurAzat
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
Milinda Wickramasinghe
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
MLG College of Learning, Inc
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Network security ppt
Network security pptNetwork security ppt
Security services
Security servicesSecurity services
Security services
Gayan Geethanjana
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
Information security
Information security Information security
Information security
razendar79
 

What's hot (20)

Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Professional Practice Course Outline
Professional Practice Course OutlineProfessional Practice Course Outline
Professional Practice Course Outline
 
Information Security
Information SecurityInformation Security
Information Security
 
SHA- Secure hashing algorithm
SHA- Secure hashing algorithmSHA- Secure hashing algorithm
SHA- Secure hashing algorithm
 
Human Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use caseHuman Factors in Cyber Security: User authentication as a use case
Human Factors in Cyber Security: User authentication as a use case
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 2
 
Security policy
Security policySecurity policy
Security policy
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Security services
Security servicesSecurity services
Security services
 
Security models
Security models Security models
Security models
 
Information security
Information security Information security
Information security
 

Viewers also liked

Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
Rachel Farnese
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Lance Michalson
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
Evan Francen
 
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMMThe Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
Hector Del Castillo, CPM, CPMM
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
The 340B Program and Implications of the Mega Guidance
The 340B Program and Implications of the Mega GuidanceThe 340B Program and Implications of the Mega Guidance
The 340B Program and Implications of the Mega Guidance
CompleteRx
 
Chp1 electronic commerce2009
Chp1 electronic commerce2009Chp1 electronic commerce2009
Chp1 electronic commerce2009
Engr Razaque
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
Engr Razaque
 
Professional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesProfessional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and Responsibilities
Upekha Vandebona
 
Guidance in perspective presentation
Guidance in perspective presentationGuidance in perspective presentation
Guidance in perspective presentationKatherine Barnachea
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
Claudia Romeo GurreaNozaleda
 
Roles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentRoles of Information Security Officers in State Government
Roles of Information Security Officers in State Government
David Sweigert
 

Viewers also liked (20)

Legal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in TechnologyLegal, Ethical and Social Issues in Technology
Legal, Ethical and Social Issues in Technology
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)Infosec Law It Web (March 2006)
Infosec Law It Web (March 2006)
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMMThe Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
The Product Manager Pathfinder - ProductCamp SoCal - H. Del Castillo, AIPMM
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
The 340B Program and Implications of the Mega Guidance
The 340B Program and Implications of the Mega GuidanceThe 340B Program and Implications of the Mega Guidance
The 340B Program and Implications of the Mega Guidance
 
Chp1 electronic commerce2009
Chp1 electronic commerce2009Chp1 electronic commerce2009
Chp1 electronic commerce2009
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Professional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and ResponsibilitiesProfessional and Ethical, Issues and Responsibilities
Professional and Ethical, Issues and Responsibilities
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Guidance in perspective presentation
Guidance in perspective presentationGuidance in perspective presentation
Guidance in perspective presentation
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Roles of Information Security Officers in State Government
Roles of Information Security Officers in State GovernmentRoles of Information Security Officers in State Government
Roles of Information Security Officers in State Government
 

Similar to 02 Legal, Ethical, and Professional Issues in Information Security

ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ssuserceaa40
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
abdukadirabdullahuad
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
hyacinthshackley2629
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
DEEPAK948083
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
503SaranyaS
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
DEEPAK948083
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
EdFeranil
 
Chapter3.ppt
Chapter3.pptChapter3.ppt
Chapter3.ppt
HaiderAli424102
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age padler01
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
Nargis Parveen
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
pixvilx
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
MeshalALshammari12
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulationsNicholas Davis
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry RegulationsNicholas Davis
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
Mukesh Chinta
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
ManishKarki12
 

Similar to 02 Legal, Ethical, and Professional Issues in Information Security (20)

ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdfch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
 
Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
lesson333.ppt
lesson333.pptlesson333.ppt
lesson333.ppt
 
Law and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptxLaw and Ethics in Information Security.pptx
Law and Ethics in Information Security.pptx
 
Chapter3.ppt
Chapter3.pptChapter3.ppt
Chapter3.ppt
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
3999779.ppt
3999779.ppt3999779.ppt
3999779.ppt
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
Data Security Law and Management.pdf
Data Security Law and Management.pdfData Security Law and Management.pdf
Data Security Law and Management.pdf
 
It industry regulations
It industry regulationsIt industry regulations
It industry regulations
 
It Industry Regulations
It Industry RegulationsIt Industry Regulations
It Industry Regulations
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8Cisco cybersecurity essentials chapter 8
Cisco cybersecurity essentials chapter 8
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

02 Legal, Ethical, and Professional Issues in Information Security

  • 1. LEGAL, ETHICAL, AND PROFESSIONAL ISSUES IN INFORMATION SECURITY
  • 2.  Differentiate between laws and ethics  Identify major national laws that relate to the practice of information security  Understand the role of culture as it applies to ethics in information security Objectives
  • 3. INTRODUCTION  You must understand scope of an organization’s legal and ethical responsibilities  To minimize liabilities/reduce risks, the information security practitioner must:  Understand current legal environment  Stay current with laws and regulations  Watch for new issues that emerge
  • 4. LAW AND ETHICS IN INFORMATION SECURITY  Laws: rules that mandate or prohibit certain societal behavior  Ethics: define socially acceptable behavior  Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these  Laws carry sanctions of a governing authority; ethics do not
  • 5. TYPES OF LAW  Civil  Criminal  Tort  Private  Public
  • 6. RELEVANT U.S. LAWS (GENERAL)  Computer Fraud and Abuse Act of 1986 (CFA Act)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Communications Decency Act of 1996 (CDA)  Computer Security Act of 1987
  • 7. PRIVACY  One of the hottest topics in information security  Is a “state of being free from unsanctioned intrusion”  Ability to aggregate data from multiple sources allows creation of information databases previously unheard of
  • 8. PRIVACY OF CUSTOMER INFORMATION  Privacy of Customer Information Section of common carrier regulation  Federal Privacy Act of 1974  Electronic Communications Privacy Act of 1986  Health Insurance Portability and Accountability Act of 1996 (HIPAA), aka Kennedy-Kassebaum Act  Financial Services Modernization Act, or Gramm-Leach-Bliley Act of 1999
  • 9. EXPORT AND ESPIONAGE LAWS  Economic Espionage Act of 1996 (EEA)  Security And Freedom Through Encryption Act of 1999 (SAFE)
  • 10. U.S. COPYRIGHT LAW  Intellectual property recognized as protected asset in the U.S.; copyright law extends to electronic formats  With proper acknowledgement, permissible to include portions of others’ work as reference  U.S. Copyright Office Web site: www.copyright.gov
  • 11. FREEDOM OF INFORMATION ACT OF 1966 (FOIA)  Allows access to federal agency records or information not determined to be matter of national security  U.S. government agencies required to disclose any requested information upon receipt of written request  Some information protected from disclosure
  • 12. STATE AND LOCAL REGULATIONS  Restrictions on organizational computer technology use exist at international, national, state, local levels  Information security professional responsible for understanding state regulations and ensuring organization is compliant with regulations
  • 13. INTERNATIONAL LAWS AND LEGAL BODIES  European Council Cyber-Crime Convention:  Establishes international task force overseeing Internet security functions for standardized international technology laws  Attempts to improve effectiveness of international investigations into breaches of technology law  Well received by intellectual property rights advocates due to emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement
  • 14. DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)  U.S. contribution to international effort to reduce impact of copyright, trademark, and privacy infringement  A response to European Union Directive 95/46/EC, which adds protection to individuals with regard to processing and free movement of personal data
  • 15. UNITED NATIONS CHARTER  Makes provisions, to a degree, for information security during information warfare (IW)  IW involves use of information technology to conduct organized and lawful military operations  IW is relatively new type of warfare, although military has been conducting electronic warfare operations for decades
  • 16. POLICY VERSUS LAW  Most organizations develop and formalize a body of expectations called policy  Policies serve as organizational laws  To be enforceable, policy must be distributed, readily available, easily understood, and acknowledged by employees
  • 18. ETHICAL DIFFERENCES ACROSS CULTURES  Cultural differences create difficulty in determining what is and is not ethical  Difficulties arise when one nationality’s ethical behavior conflicts with ethics of another national group  Example: many of ways in which Asian cultures use computer technology is software piracy
  • 19. ETHICS AND EDUCATION  Overriding factor in leveling ethical perceptions within a small population is education  Employees must be trained in expected behaviors of an ethical employee, especially in areas of information security  Proper ethical training vital to creating informed, well prepared, and low-risk system user
  • 20. DETERRENCE TO UNETHICAL AND ILLEGAL BEHAVIOR  Deterrence: best method for preventing an illegal or unethical activity; e.g., laws, policies, technical controls  Laws and policies only deter if three conditions are present:  Fear of penalty  Probability of being caught  Probability of penalty being administered
  • 21. CODES OF ETHICS AND PROFESSIONAL ORGANIZATIONS  Several professional organizations have established codes of conduct/ethics  Codes of ethics can have positive effect; unfortunately, many employers do not encourage joining of these professional organizations  Responsibility of security professionals to act ethically and according to policies of employer, professional organization, and laws of society
  • 22. ASSOCIATION OF COMPUTING MACHINERY (ACM)  ACM established in 1947 as “the world's first educational and scientific computing society”  Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others’ privacy, and respecting others’ intellectual property
  • 23. INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. (ISC)2  Non-profit organization focusing on development and implementation of information security certifications and credentials  Code primarily designed for information security professionals who have certification from (ISC)2  Code of ethics focuses on four mandatory canons
  • 24. SYSTEM ADMINISTRATION, NETWORKING, AND SECURITY INSTITUTE (SANS)  Professional organization with a large membership dedicated to protection of information and systems  SANS offers set of certifications called Global Information Assurance Certification (GIAC)
  • 25. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION (ISACA)  Professional association with focus on auditing, control, and security  Concentrates on providing IT control practices and standards  ISACA has code of ethics for its professionals
  • 26. COMPUTER SECURITY INSTITUTE (CSI)  Provides information and training to support computer, networking, and information security professionals  Though without a code of ethics, has argued for adoption of ethical behavior among information security professionals
  • 27. INFORMATION SYSTEMS SECURITY ASSOCIATION (ISSA)  Nonprofit society of information security (IS) professionals  Primary mission to bring together qualified IS practitioners for information exchange and educational development  Promotes code of ethics similar to (ISC)2, ISACA and ACM
  • 28. OTHER SECURITY ORGANIZATIONS  Internet Society (ISOC): promotes development and implementation of education, standards, policy and education to promote the Internet  Computer Security Division (CSD): division of National Institute for Standards and Technology (NIST); promotes industry best practices and is important reference for information security professionals
  • 29. OTHER SECURITY ORGANIZATIONS (CONTINUED)  CERT Coordination Center (CERT/CC): center of Internet security expertise operated by Carnegie Mellon University  Computer Professionals for Social Responsibility (CPSR): public organization for anyone concerned with impact of computer technology on society
  • 30. KEY U.S. FEDERAL AGENCIES  Department of Homeland Security (DHS)  Federal Bureau of Investigation’s National Infrastructure Protection Center (NIPC)  National Security Agency (NSA)  U.S. Secret Service
  • 31. ORGANIZATIONAL LIABILITY AND THE NEED FOR COUNSEL  Liability is legal obligation of an entity; includes legal obligation to make restitution for wrongs committed  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that an organization make valid effort to protect others and continually maintain that level of effort
  • 32. SUMMARY  Laws: rules that mandate or prohibit certain behavior in society; drawn from ethics  Ethics: define socially acceptable behaviors; based on cultural mores (fixed moral attitudes or customs of a particular group)  Types of law: civil, criminal, tort law, private, public
  • 33. SUMMARY  Relevant U.S. laws:  Computer Fraud and Abuse Act of 1986 (CFA Act)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Communications Decency Act of 1996 (CDA)  Computer Security Act of 1987
  • 34. SUMMARY  Many organizations have codes of conduct and/or codes of ethics  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that organization make valid effort to protect others and continually maintain that effort