Lecture 11: Law and Ethics

Slides:



Advertisements
Similar presentations
H = P = A = HIPAA DEFINED HIPAA … A Federal Law Created in 1996 Health
Advertisements

ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
In civilized life, law floats in a sea of ethics.
Principles of Information Security, 3rd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
School Law Boot Camp – Part 1.  LEGAL ONE Video LEGAL ONE Video  SMALL GROUP ACTIVITY  ALL GROUPS – ◦ Analyze the Cyberbullying Video Scenario Questions.
Legal, Ethical, and Professional Issues in Information Security
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Legal, Regulations, Compliance and Investigations.
Chapter 29 Ethics in Accounting
Information Systems Security Officer
Legal, Ethical, and Professional Issues In Information Security.
Privacy & Personal Information -- Why do we care or do we?
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
By Drudeisha Madhub Data Protection Commissioner Date:
Internal Auditing and Outsourcing
CSE 4482: Computer Security Management: Assessment and Forensics
1 When hate speech tangles privacy... When hate speech tangles privacy...
Management of Information Security Chapter 11 Law And Ethics
Principles of Information Security, Fifth Edition
Principles of Information Security, Fourth Edition
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
Management of Information Security, 4th Edition
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
CORPORATE COMPLIANCE PROGRAM The Office of Corporate Integrity
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Textbook for Nursing Assistants Chapter 4: Legal and Ethical Issues.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
Principles of Information Security, 2nd Edition2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To.
TEL2813/IS2820 Security Management Legal & Ethical Issues April 15, 2008.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 12 L AW AND E THICS In law a man is guilty when he violates the rights of others. In ethics he.
Legal and Ethical Responsibilities
Unit 4 Legal and Ethical Responsibilities. 4:1 Legal Responsibilities Copyright © 2004 by Thomson Delmar Learning. ALL RIGHTS RESERVED. 2 Introduction.
Principles of Information Security, 2nd Edition2  Use this chapter as a guide for future reference on laws, regulations, and professional organizations.
Chapter 12 “Law and Ethics” Benjamin Barry Lori Blair Chuck Fell David Kidd Sri Vuyyuru Management of Information Security, 3rd ed.1 Spring 2012 / CIS.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
IT Professionalism Ethics Modified by Andrew Poon.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Copyright ©2014 by Saunders, an imprint of Elsevier Inc. All rights reserved 1 Chapter 02 Compliance, Privacy, Fraud, and Abuse in Insurance Billing Insurance.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
MANAGEMENT of INFORMATION SECURITY Second Edition.
Chapter 4: Laws, Regulations, and Compliance
Legal and Ethical Responsibilities. Legal Responsibilities Introduction Criminal law Civil law Tort Malpractice Negligence (continues)
Karly Stinedurf.  What is Ethics?  The Ten Commandments of Computer Ethics  Frameworks/Standards of Ethics  Ethics and Education  Deterring Unethical.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Legal and Ethical Responsibilities
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Law and Ethics INFORMATION SECURITY MANAGEMENT
Legal Aspects of Nursing
Legal and Ethical Responsibilities
Principles of Information Security, Fourth Edition
Privacy and the Law.
Principles of Information Security, Fourth Edition
Principles of Information Security, Fifth Edition
Legal and Ethical Issues
Legal, Regulations, Compliance and Investigations
Introduction to Computer Forensics
Legal and Ethical Responsibilities
Legal and Ethical Responsibilities
Principles of Information Security, Fifth Edition
CompTIA Security+ Study Guide (SY0-401)
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Legal and Ethical Responsibilities
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Introduction to Digital Forensics
Presentation transcript:

Lecture 11: Law and Ethics INFORMATION SECURITY MANAGEMENT Lecture 11: Law and Ethics You got to be careful if you don’t know where you’re going, because you might not get there. – Yogi Berra

Introduction All information security professionals must understand the scope of an organization’s legal and ethical responsibilities Educate employees and management about their legal and ethical obligations concerning proper use of information technology

Law and Ethics Laws vs. Ethics Types of Law Civil law Criminal law Tort law Private law Public law

Information Security and the Law InfoSec professionals and managers must understand the legal framework within which their organizations operate

Relevant U.S. Laws The Computer Fraud and Abuse Act of 1986 (CFA Act) The Computer Security Act of 1987 Health Insurance Portability & Accountability Act Of 1996 (HIPAA) Financial Services Modernization Act Freedom of Information Act of 1966 Sarbanes-Oxley Act of 2002

Relevant U.S. Laws (cont’d.) Privacy Laws Privacy of Customer Information Section The Federal Privacy Act of 1974 regulates the government’s use of private information Electronic Communications Privacy Act of 1986 These statutes work in cooperation with the Fourth Amendment of the U.S. Constitution

Relevant U.S. Laws (cont’d.) Export and Espionage Laws Economic Espionage Act (EEA) of 1996 The Security and Freedom through Encryption Act of 1997

International Laws and Legal Bodies There are currently few international laws relating to privacy and information security European Council Cyber-Crime Convention The Digital Millennium Copyright Act European Union Directive 95/46/EC Database Right

State and Local Regulations Information security professionals must understand state laws and regulations Example: Georgia Computer Systems Protection Act

Policy Versus Law Difference between policy and law Policies must be: Distributed to all individuals who are expected to comply with them Readily available for employee reference Easily understood, with multilingual, visually impaired and low-literacy translations Acknowledged by employee with consent form Uniformly enforced for all employees

Ethics and Education Key studies reveal that the overriding factor in leveling the ethical perceptions within a small population is education Employees must be trained on the expected behaviors of an ethical employee

Deterring Unethical and Illegal Behavior InfoSec personnel should do everything in their power to deter unethical and illegal acts Categories of unethical behavior Ignorance Accident Intent Best Approach: Deterrence

Professional Organizations and their Codes of Ethics Some professional organizations have established codes of conduct and/or codes of ethics Other Sources of Ethics Codes: ACM SANS ISC2 ISACA ISSA

Ethics Rules, not laws that are minimum standards for professional behavior ISC2 Code of Ethics Protect society, the commonwealth and the infrastructure Act honorably, honestly, justly, responsibly, and legally Provide dilligent and competent service to principals Advance and protect the profession

Key Law Enforcement Agencies Federal Bureau of Investigation InfraGard Program National Security Agency Information Assurance Directorate (IAD) U.S. Secret Service Department of Homeland Security

Managing Investigations in the Organization It’s not a matter of “if” but “when” Investigation Steps Documentation is key Digital Forensics

Managing Investigations: Digital Forensics The investigation of what happened and how Involves the preservation, identification, extraction, documentation, and interpretation of computer media for evidentiary and/or root cause analysis Evidentiary material (EM) Any information that could potentially support the organizations legal- or policy-based case against a suspect

Managing Investigations: Digital Forensics Two key purposes: Investigate allegations of digital malfeasance Perform root cause analysis Approaches: Protect and forget (patch and proceed) Apprehend and prosecute (pursue and prosecute)

Affidavits and Search Warrants Investigations begin with an allegation or an indication of an incident Forensics team requests permission to examine digital media for potential EM Affidavit Search warrant

Digital Forensics Methodology Steps in the digital forensics methodology Identify relevant items of evidentiary value Acquire (seize) the evidence without alteration or damage Take steps to assure that the evidence is at every step verifiably authentic and is unchanged from the time it was seized Analyze the data without risking modification or unauthorized access Report the findings to the proper authority

Digital Forensics Methodology Figure 12-2: Digital forensics process Source: Course Technology/Cengage Learning

Evidentiary Procedures Organizations should develop specific procedures and guidance for their use