Book description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!
Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. Part 1 of this book discusses fundamental security and privacy concepts. Part 2 examines recent US laws that address information security and privacy. And Part 3 considers security and privacy for organizations.
Table of contents
- Copyright
- Preface
- Acknowledgments
- About the Author
-
ONE. Fundamental Concepts
-
1. Information Security Overview
- Why Is Information Security an Issue?
- What Is Information Security?
- Common Information Security Concepts
- What Are Common Information Security Concerns?
- Do Different Types of Information Require Different Types of Protection?
- What Are the Mechanisms That Ensure Information Security?
- Do Special Kinds of Data Require Special Kinds of Protection?
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 1 ASSESSMENT
-
2. Privacy Overview
- Why Is Privacy an Issue?
- What Is Privacy?
- How Is Privacy Different from Information Security?
- What Are the Sources of Privacy Law?
- What Are Threats to Personal Data Privacy in the Information Age?
- What Is Workplace Privacy?
- What Are General Principles for Privacy Protection in Information Systems?
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 2 ASSESSMENT
- ENDNOTES
- 3. The American Legal System
-
1. Information Security Overview
-
TWO. Laws Influencing Information Security
-
4. Security and Privacy of Consumer Financial Information
- Business Challenges Facing Financial Institutions
- The Different Types of Financial Institutions
- Consumer Financial Information
- Who Regulates Financial Institutions?
- Federal Financial Institutions Examination Council (FFIEC)
- The Gramm-Leach-Bliley Act
- Federal Trade Commission Red Flags Rule
- Payment Card Industry Standards
- Case Studies and Examples
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 4 ASSESSMENT
- ENDNOTES
- 5. Security and Privacy of Information Belonging to Children and Educational Records
-
6. Security and Privacy of Health Information
- Business Challenges Facing the Health Care Industry
- Why Is Health Care Information So Sensitive?
- The Health Insurance Portability and Accountability Act
- The HITECH Act
- The Role of State Laws Protecting Medical Records
- Case Studies and Examples
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 6 ASSESSMENT
- ENDNOTES
-
7. Corporate Information Security and Privacy Regulation
- The Enron Scandal and Securities-Law Reform
- Why Is Accurate Financial Reporting Important?
- The Sarbanes-Oxley Act of 2002
- Compliance and Security Controls
- SOX Influence in Other Types of Companies
- Corporate Privacy Issues
- Case Studies and Examples
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 7 ASSESSMENT
- ENDNOTES
- 8. Federal Government Information Security and Privacy Regulations
- 9. State Laws Protecting Citizen Information and Breach Notification Laws
-
10. Intellectual Property Law
- The Digital Wild West and the Importance of Intellectual Property Law
- Legal Ownership and the Importance of Protecting Intellectual Property
- Patents
- Trademarks
- Copyright
- Protecting Copyrights Online—The Digital Millennium Copyright Act (DMCA)
- Case Studies and Examples
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 10 ASSESSMENT
- ENDNOTES
- 11. The Role of Contracts
- 12. Criminal Law and Tort Law Issues in Cyberspace
-
4. Security and Privacy of Consumer Financial Information
-
THREE. Security and Privacy in Organizations
-
13. Information Security Governance
- What Is Information Security Governance?
- Information Security Governance Documents
- Recommended Information Security Policies
- Case Studies and Examples
- CHAPTER SUMMARY
- KEY CONCEPTS AND TERMS
- CHAPTER 13 ASSESSMENT
- ENDNOTES
- 14. Risk Analysis, Incident Response, and Contingency Planning
- 15. Computer Forensics and Investigations
-
13. Information Security Governance
- A. Answer Key
- B. Standard Acronyms
- C. Law and Case Citations
-
D. The Constitution of the United States of America
-
Amendments to the Constitution of the United States of America.
- Amendment I (1791)
- Amendment II (1791)
- Amendment III (1791)
- Amendment IV (1791)
- Amendment V (1791)
- Amendment VI (1791)
- Amendment VII (1791)
- Amendment VIII (1791)
- Amendment IX (1791)
- Amendment × (1791)
- Amendment XI (1795)
- Amendment XII (1804)
- Amendment XIII (1865)
- Amendment XIV (1868)
- Amendment XV (1870)
- Amendment XVI (1913)
- Amendment XVII (1913)
- Amendment XVIII (1919)
- Amendment XIX (1920)
- Amendment XX (1933)
- Amendment XXI (1933)
- Amendment XXII (1951)
- Amendment XXIII (1961)
- Amendment XXIV (1964)
- Amendment XXV (1967)
- Amendment XXVI (1971)
- Amendment XXVII (1992)
- Glossary of Key Terms
- References
Product information
- Title: Legal Issues in Information Security
- Author(s):
- Release date: October 2010
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9780763791865
You might also like
book
Legal and Privacy Issues in Information Security, 3rd Edition
Thoroughly revised and updated to address the many changes in this evolving field, the third edition …
book
The Basics of Information Security, 2nd Edition
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental …
book
Information Security Policies, Procedures, and Standards
This book supplies a blueprint on how to develop effective information security policies and procedures. It …
book
Information Security Handbook
Implement information security effectively as per your organization's needs. About This Book Learn to build your …