Thursday, June 13, 2019

Law And Case Policy Case Study Example | Topics and Well Written Essays - 1000 words

Law And Policy - Case Study ExampleAn examination of the present legal environment reveals the effectiveness of policies in safeguarding task information and information systems. More than ever before, occupancyes are rapidly globalizing their operations due to the expansion of e-commerce abilities. This has resulted in the emergence of robust information systems that encompass great quantities of line of work-related information. As a consequence, business enterprisees have increasingly started depending on third-party vendors for diverse business operations, posing immense challenges to information security. Vendors such as contractors need to guarantee guard of valuable customer data. Complex systems are needed to handle these complex business opportunities and challenges. Consequently, information security policies are essential to effective everyday business operations. Policies encompass both government polices and organizational polices. With regard to government polici es, the US is renowned for its development and implementation of robust information security legislation to admonish exploitation and misuse of information and information systems and technology. Such legislation provides a reliable business environment, ensuring a stable economy (IT Governance Institute, 2004). Prominent government policies on information security include the 1986 Computer Fraud and Abuse feat (CFA Act), which is the foundation of most computer and information-related federal justnesss. The 1996 National Information stem Protection Act amended the 1986 law, increasing penalties for information-related crimes. The degree of the penalties imposed depends on the essence of the information acquired and used and whether or not the information-related offense was committed for commercial message advantage, personal financial gain or the perpetuation of a criminal act, for instance, fraud. The US Patriotic Act has modified various laws, allowing greater latitude to l aw enforcement agencies in order to deter terrorism-related activities that encompass the use of information and information system for instance, making information available for terrorist activities. However, perhaps some of the most central government legislation that govern information dissemination, confidentiality and integrity include the 1996 Telecommunications Deregulation and Competition Act, which regulates telecommunications, both foreign and interstate (IT Governance Institute, 2004). Additionally, the 1966 Freedom of Information Act facilitates disclosure of formerly unreleased documents or information controlled by the government, for instance, tax records. In order to protect businesses against illegal access to stored information on business and personal communications, the government established the Unlawful Access to Stored Communications. This law is particularly important since it deters access and dissemination of business and personal communications, especiall y those carrying vital business details. The Computer Fraud and Abuse Act, which was last amended in 2006, helps to deter computer-related acts of unlawful information use, dissemination and access (IT Governance In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.