O'Reilly logo

Fundamentals of Information Systems Security by Michael G. Solomon, David Kim

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. U.S. Compliance Laws

CYBERSPACE BRINGS NEW THREATS to U.S. citizens and organizations. People are sharing more data than ever before. People share data online to purchase goods and services. They also share data to network with colleagues and connect with friends. Organizations collect and use data to conduct business. Federal and state governments collect and use information to provide for their citizens.

With the increased collection of data come questions about proper use of it. People demand that the organizations entrusted with their sensitive data take steps to protect it. If the organizations don't voluntarily protect that data, people often say, "There ought to be a law." The United States doesn't have one comprehensive data ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required