SlideShare a Scribd company logo
1
Information Security
Lecture # 44
Dr. Shafiq Hussain
Associate Professor & Chairperson
Department of Computer Science
2
Objectives
• Introduction to Law in Information Security.
3
Law in Information Security
• Information Security Law is the body of legal rules,
codes, and standards that require you to protect that
information and the information systems that process
it, from unauthorized access.
• The legal risks are potentially significant if you don’t
take a pragmatic approach.
4
Law in Information Security (Cont..)
Why is Information Security Law important?
• Securing information is about securing value. In the
same way that we secure physical stores of value
such as cash, gold, or jewelery against theft, loss, or
destruction, we must do the same with digital stores
of value – particularly information.
5
Law in Information Security (Cont..)
Why is Information Security Law important?
• We live in an information society, after all, where the
creation, use, and distribution of information is a
significant economic, political, and cultural activity.
6
Law in Information Security (Cont..)
Why is Information Security Law important?
• We are moving from the service economy into the
information economy, which emphasizes
informational activities that rely on information
technologies such as computers, mobile devices, and
the Internet.
7
Law in Information Security (Cont..)
Information Security Laws and Regulations
General Data Protection Regulation (GDPR):
• The GDPR is a European Union (EU) data protection
regulation that came into effect on May 25, 2018.
• It intends to protect the privacy and personal data of
EU residents by providing guidelines for data
processing and handling.
8
Law in Information Security (Cont..)
Information Security Laws and Regulations
General Data Protection Regulation (GDPR):
• Non-compliance with GDPR can lead to hefty fines
of up to 4% of a company's annual revenue or €20
million, whichever is higher.
9
Law in Information Security (Cont..)
Information Security Laws and Regulations
General Data Protection Regulation (GDPR):
• Created: May 25, 2018
• Intends to protect: the privacy and personal data of
EU residents
10
Law in Information Security (Cont..)
Information Security Laws and Regulations
California Consumer Privacy Act (CCPA):
• The CCPA is a California state law that came into
effect on January 1, 2020.
• It intends to protect the privacy and personal
information of California residents by regulating how
businesses collect, store, and share consumer data.
11
Law in Information Security (Cont..)
Information Security Laws and Regulations
California Consumer Privacy Act (CCPA):
• The law applies to businesses that meet certain
criteria and can lead to fines for non-compliance.
12
Law in Information Security (Cont..)
Information Security Laws and Regulations
California Consumer Privacy Act (CCPA):
• Created: January 1, 2020
• Intends to protect: the privacy and personal
information of California residents
13
Law in Information Security (Cont..)
Information Security Laws and Regulations
Health Insurance Portability and Accountability Act
(HIPAA):
• HIPAA is a federal law that sets standards for the
protection of personal health information (PHI).
14
Law in Information Security (Cont..)
Information Security Laws and Regulations
Health Insurance Portability and Accountability Act
(HIPAA):
• The law applies to healthcare providers, insurers, and
their business associates.
• HIPAA covers the confidentiality, integrity, and
availability of PHI and provides guidelines for its
protection.
15
Law in Information Security (Cont..)
Information Security Laws and Regulations
Health Insurance Portability and Accountability Act
(HIPAA):
• Created: 1996
• Intends to protect: personal health information (PHI)
16
Law in Information Security (Cont..)
Information Security Laws and Regulations
Payment Card Industry Data Security Standard
(PCI DSS):
• PCI DSS is a set of cybersecurity standards created
by major credit card companies to protect credit card
data.
17
Law in Information Security (Cont..)
Information Security Laws and Regulations
Payment Card Industry Data Security Standard
(PCI DSS):
• The standards apply to all organizations that process,
store, or transmit credit card information. Compliance
with PCI DSS is mandatory for businesses that accept
credit card payments.
18
Law in Information Security (Cont..)
Information Security Laws and Regulations
Payment Card Industry Data Security Standard
(PCI DSS):
• Created: December 15, 2004
• Intends to protect: credit card data
19
Law in Information Security (Cont..)
Information Security Laws and Regulations
Federal Information Security Management Act
(FISMA):
• FISMA is a federal law that requires federal agencies
to establish and maintain information security
programs.
20
Law in Information Security (Cont..)
Information Security Laws and Regulations
Federal Information Security Management Act
(FISMA):
• The law aims to provide a comprehensive framework
for risk management and the protection of federal
information and information systems.
• FISMA compliance is mandatory for all federal
agencies and their contractors.
21
Law in Information Security (Cont..)
Information Security Laws and Regulations
Federal Information Security Management Act
(FISMA):
• Created: December 2002
• Intends to protect: federal information and
information systems
22
Law in Information Security (Cont..)
Information Security Laws and Regulations
Prevention of Electronic Crimes Act, 2016:
• In 2016, the National Assembly of Pakistan enacted
the Prevention of Electronic Crimes Act (“PECA”) to
provide a comprehensive legal framework to define
various kinds of electronic crimes, mechanisms for
investigation, prosecution and adjudication in relation
to electronic crimes.
23
Law in Information Security (Cont..)
Information Security Laws and Regulations
Prevention of Electronic Crimes Act, 2016:
• Section 21 provides that use of electronic means that
may result in reputational damage or breach of
privacy shall be punishable with imprisonment of up
to 7 years or with which may extend up to 5 million
rupees or both.
24
Law in Information Security (Cont..)
Information Security Laws and Regulations
Prevention of Electronic Crimes Act, 2016:
• Under Section 22, punishment of up to seven years or
fine up to 5 million rupees or both has been
prescribed for the offence of producing, distributing
or transmitting pornographic material showing
underage girls engaged in sexually explicit conduct.
25
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
• Here are 3 of the most known cybersecurity
regulations and the key steps to comply with them:
26
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
GDPR:
• Identify the personal data you process and why you
process it.
• Obtain explicit consent from individuals to collect
and use their data.
• Appoint a Data Protection Officer (DPO) if
necessary.
27
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
GDPR:
• Implement appropriate security measures to protect
personal data.
• Ensure that data processors comply with the GDPR.
• Conduct Data Protection Impact Assessments
(DPIAs) for high-risk processing activities.
28
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
GDPR:
• Implement procedures for responding to data breaches.
• Educate employees on GDPR compliance.
• Maintain detailed records of data processing activities.
• Cooperate with data protection authorities in the event
of an investigation or audit.
29
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
HIPAA:
• Implementing administrative, physical, and technical
safeguards to protect patient information.
• Appointing a HIPAA privacy officer to oversee
compliance.
30
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
HIPAA:
• Conducting regular risk assessments to identify
potential vulnerabilities and areas for improvement.
• Developing and implementing policies and
procedures for data security and breach notification.
31
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
HIPAA:
• Providing ongoing staff training on HIPAA
regulations and security best practices.
• Establishing a contingency plan for responding to
security incidents or breaches.
• Ensuring that business associates, such as vendors or
contractors, are also HIPAA compliant.
32
Law in Information Security (Cont..)
How to comply with multiple cybersecurity
regulations?
PCI DSS:
• Build and maintain a secure network.
• Protect cardholder data.
• Maintain a vulnerability management program.
• Implement strong access control measures.
• Regularly monitor and test networks.
• Maintain an information security policy.
33
Questions
Any Question Please?
You can contact me at: drshafiq@uosahiwal.edu.pk
Your Query will be answered within one working day.
34
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown
35
Thanks

More Related Content

PPTX
Chapter1 Cyber security Law & policy.pptx
PDF
Accountability under the GDPR: What does it mean for Boards & Senior Management?
PPTX
Enforcement and Litigation Trends and Developments in Privacy and Data Security
PPTX
CYBER Crime Cyber Security Cyber Law INDIA
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PDF
Examples of international privacy legislation
PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PPTX
Data Protection Rules are Changing: What Can You Do to Prepare?
Chapter1 Cyber security Law & policy.pptx
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Enforcement and Litigation Trends and Developments in Privacy and Data Security
CYBER Crime Cyber Security Cyber Law INDIA
A practical data privacy and security approach to ffiec, gdpr and ccpa
Examples of international privacy legislation
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
Data Protection Rules are Changing: What Can You Do to Prepare?

Similar to Lecture-45.pptxLecture-33 programming lacture notes.pptx (20)

PPTX
The Future of the Modern Workplace Event 2019 - Data Security and Protection
PPTX
Legal, ethical, and professional issues in information security.pptx
PDF
Data Security Law and Management.pdf
PPTX
introduction to cyber forensics, digital
PDF
Flight East 2018 Presentation–Data Breaches and the Law
PPT
969_powerpoint_on_data_protection.ppt
PDF
Spice Route Legal Data Protection & Privacy Update
PPT
Data Risks In A Digital Age
PPT
The Countdown is on: Key Things to Know About the GDPR
PPTX
Cyber Crime with basics and knowledge to cyber sphere
PPTX
INFORMATION Communication Technology (ICT) ACT
PPT
HIPAA, Privacy, Security, and Good Business
PDF
How to Approach the NYDFS Proposed Cybersecurity Requirements
PPTX
SUNITA PATIL LLB II YEAR PPT Cyber_Law_in_India_.pptx
PDF
Office of the Privacy Commissioner of Canada (OPC) Content Summary
PPTX
Dataprotectionpackage 2015pptx
PPTX
Unit 6 Privacy and Data Protection 8 hr
PPTX
COI/ IT LAWS AND PRACTICES Module 1.pptx
PDF
DPIA step by step process approach and methodology
PPTX
Data Protection Centre Presentation 300123.pptx
The Future of the Modern Workplace Event 2019 - Data Security and Protection
Legal, ethical, and professional issues in information security.pptx
Data Security Law and Management.pdf
introduction to cyber forensics, digital
Flight East 2018 Presentation–Data Breaches and the Law
969_powerpoint_on_data_protection.ppt
Spice Route Legal Data Protection & Privacy Update
Data Risks In A Digital Age
The Countdown is on: Key Things to Know About the GDPR
Cyber Crime with basics and knowledge to cyber sphere
INFORMATION Communication Technology (ICT) ACT
HIPAA, Privacy, Security, and Good Business
How to Approach the NYDFS Proposed Cybersecurity Requirements
SUNITA PATIL LLB II YEAR PPT Cyber_Law_in_India_.pptx
Office of the Privacy Commissioner of Canada (OPC) Content Summary
Dataprotectionpackage 2015pptx
Unit 6 Privacy and Data Protection 8 hr
COI/ IT LAWS AND PRACTICES Module 1.pptx
DPIA step by step process approach and methodology
Data Protection Centre Presentation 300123.pptx
Ad

More from MUHAMMADAHMAD173574 (16)

PPTX
Lecture-33 programming lacture notes.pptx
PPTX
Lecture-39.pptx Xperia of this slide can conversation
PPTX
Lecture also solve this ppy slit for next-14.pptx
PPTX
Lectur can you explain me this slidee-17.pptx
PPTX
Lecture-8. I know this slide is littlepptx
PPTX
Lecture- program are executed in syst9.pptx
PPTX
Lecture-6 about this slide programs .pptx
PPTX
Lecture-2 about programming download.pptx
PPTX
Lecture-10 about language of community.pptx
PPTX
Lecture-1 about programming language.pptx
PDF
MobApp 02- for HTML5 for Mobiles (1).pdf
PPTX
MobApp 01- Mobile Application Development Platform (1).pptx
PDF
Android Programming lecture 1-2 with full character.pdf
PPTX
CN Lecture 7 CN slide for ppt presentation.pptx
PPTX
CN word documentary lec 8 (Ip addressing).pptx
PPTX
CN lacture 6.pptxhsjsbsbsksnsbsbnsjssvsv
Lecture-33 programming lacture notes.pptx
Lecture-39.pptx Xperia of this slide can conversation
Lecture also solve this ppy slit for next-14.pptx
Lectur can you explain me this slidee-17.pptx
Lecture-8. I know this slide is littlepptx
Lecture- program are executed in syst9.pptx
Lecture-6 about this slide programs .pptx
Lecture-2 about programming download.pptx
Lecture-10 about language of community.pptx
Lecture-1 about programming language.pptx
MobApp 02- for HTML5 for Mobiles (1).pdf
MobApp 01- Mobile Application Development Platform (1).pptx
Android Programming lecture 1-2 with full character.pdf
CN Lecture 7 CN slide for ppt presentation.pptx
CN word documentary lec 8 (Ip addressing).pptx
CN lacture 6.pptxhsjsbsbsksnsbsbnsjssvsv
Ad

Recently uploaded (20)

PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PDF
Urban Design Final Project-Context
PPTX
AC-Unit1.pptx CRYPTOGRAPHIC NNNNFOR ALL
PDF
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
PDF
Key Trends in Website Development 2025 | B3AITS - Bow & 3 Arrows IT Solutions
PPTX
Wisp Textiles: Where Comfort Meets Everyday Style
PDF
BRANDBOOK-Presidential Award Scheme-Kenya-2023
PPTX
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
PPT
pump pump is a mechanism that is used to transfer a liquid from one place to ...
PDF
Quality Control Management for RMG, Level- 4, Certificate
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
DOC-20250430-WA0014._20250714_235747_0000.pptx
PPTX
EDP Competencies-types, process, explanation
PDF
Trusted Executive Protection Services in Ontario — Discreet & Professional.pdf
PPTX
joggers park landscape assignment bandra
PPTX
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
PPTX
rapid fire quiz in your house is your india.pptx
PPTX
HPE Aruba-master-icon-library_052722.pptx
PDF
Design Thinking - Module 1 - Introduction To Design Thinking - Dr. Rohan Dasg...
PPTX
Media And Information Literacy for Grade 12
YV PROFILE PROJECTS PROFILE PRES. DESIGN
Urban Design Final Project-Context
AC-Unit1.pptx CRYPTOGRAPHIC NNNNFOR ALL
Skskkxiixijsjsnwkwkaksixindndndjdjdjsjjssk
Key Trends in Website Development 2025 | B3AITS - Bow & 3 Arrows IT Solutions
Wisp Textiles: Where Comfort Meets Everyday Style
BRANDBOOK-Presidential Award Scheme-Kenya-2023
Complete Guide to Microsoft PowerPoint 2019 – Features, Tools, and Tips"
pump pump is a mechanism that is used to transfer a liquid from one place to ...
Quality Control Management for RMG, Level- 4, Certificate
Interior Structure and Construction A1 NGYANQI
DOC-20250430-WA0014._20250714_235747_0000.pptx
EDP Competencies-types, process, explanation
Trusted Executive Protection Services in Ontario — Discreet & Professional.pdf
joggers park landscape assignment bandra
LITERATURE CASE STUDY DESIGN SEMESTER 5.pptx
rapid fire quiz in your house is your india.pptx
HPE Aruba-master-icon-library_052722.pptx
Design Thinking - Module 1 - Introduction To Design Thinking - Dr. Rohan Dasg...
Media And Information Literacy for Grade 12

Lecture-45.pptxLecture-33 programming lacture notes.pptx

  • 1. 1 Information Security Lecture # 44 Dr. Shafiq Hussain Associate Professor & Chairperson Department of Computer Science
  • 2. 2 Objectives • Introduction to Law in Information Security.
  • 3. 3 Law in Information Security • Information Security Law is the body of legal rules, codes, and standards that require you to protect that information and the information systems that process it, from unauthorized access. • The legal risks are potentially significant if you don’t take a pragmatic approach.
  • 4. 4 Law in Information Security (Cont..) Why is Information Security Law important? • Securing information is about securing value. In the same way that we secure physical stores of value such as cash, gold, or jewelery against theft, loss, or destruction, we must do the same with digital stores of value – particularly information.
  • 5. 5 Law in Information Security (Cont..) Why is Information Security Law important? • We live in an information society, after all, where the creation, use, and distribution of information is a significant economic, political, and cultural activity.
  • 6. 6 Law in Information Security (Cont..) Why is Information Security Law important? • We are moving from the service economy into the information economy, which emphasizes informational activities that rely on information technologies such as computers, mobile devices, and the Internet.
  • 7. 7 Law in Information Security (Cont..) Information Security Laws and Regulations General Data Protection Regulation (GDPR): • The GDPR is a European Union (EU) data protection regulation that came into effect on May 25, 2018. • It intends to protect the privacy and personal data of EU residents by providing guidelines for data processing and handling.
  • 8. 8 Law in Information Security (Cont..) Information Security Laws and Regulations General Data Protection Regulation (GDPR): • Non-compliance with GDPR can lead to hefty fines of up to 4% of a company's annual revenue or €20 million, whichever is higher.
  • 9. 9 Law in Information Security (Cont..) Information Security Laws and Regulations General Data Protection Regulation (GDPR): • Created: May 25, 2018 • Intends to protect: the privacy and personal data of EU residents
  • 10. 10 Law in Information Security (Cont..) Information Security Laws and Regulations California Consumer Privacy Act (CCPA): • The CCPA is a California state law that came into effect on January 1, 2020. • It intends to protect the privacy and personal information of California residents by regulating how businesses collect, store, and share consumer data.
  • 11. 11 Law in Information Security (Cont..) Information Security Laws and Regulations California Consumer Privacy Act (CCPA): • The law applies to businesses that meet certain criteria and can lead to fines for non-compliance.
  • 12. 12 Law in Information Security (Cont..) Information Security Laws and Regulations California Consumer Privacy Act (CCPA): • Created: January 1, 2020 • Intends to protect: the privacy and personal information of California residents
  • 13. 13 Law in Information Security (Cont..) Information Security Laws and Regulations Health Insurance Portability and Accountability Act (HIPAA): • HIPAA is a federal law that sets standards for the protection of personal health information (PHI).
  • 14. 14 Law in Information Security (Cont..) Information Security Laws and Regulations Health Insurance Portability and Accountability Act (HIPAA): • The law applies to healthcare providers, insurers, and their business associates. • HIPAA covers the confidentiality, integrity, and availability of PHI and provides guidelines for its protection.
  • 15. 15 Law in Information Security (Cont..) Information Security Laws and Regulations Health Insurance Portability and Accountability Act (HIPAA): • Created: 1996 • Intends to protect: personal health information (PHI)
  • 16. 16 Law in Information Security (Cont..) Information Security Laws and Regulations Payment Card Industry Data Security Standard (PCI DSS): • PCI DSS is a set of cybersecurity standards created by major credit card companies to protect credit card data.
  • 17. 17 Law in Information Security (Cont..) Information Security Laws and Regulations Payment Card Industry Data Security Standard (PCI DSS): • The standards apply to all organizations that process, store, or transmit credit card information. Compliance with PCI DSS is mandatory for businesses that accept credit card payments.
  • 18. 18 Law in Information Security (Cont..) Information Security Laws and Regulations Payment Card Industry Data Security Standard (PCI DSS): • Created: December 15, 2004 • Intends to protect: credit card data
  • 19. 19 Law in Information Security (Cont..) Information Security Laws and Regulations Federal Information Security Management Act (FISMA): • FISMA is a federal law that requires federal agencies to establish and maintain information security programs.
  • 20. 20 Law in Information Security (Cont..) Information Security Laws and Regulations Federal Information Security Management Act (FISMA): • The law aims to provide a comprehensive framework for risk management and the protection of federal information and information systems. • FISMA compliance is mandatory for all federal agencies and their contractors.
  • 21. 21 Law in Information Security (Cont..) Information Security Laws and Regulations Federal Information Security Management Act (FISMA): • Created: December 2002 • Intends to protect: federal information and information systems
  • 22. 22 Law in Information Security (Cont..) Information Security Laws and Regulations Prevention of Electronic Crimes Act, 2016: • In 2016, the National Assembly of Pakistan enacted the Prevention of Electronic Crimes Act (“PECA”) to provide a comprehensive legal framework to define various kinds of electronic crimes, mechanisms for investigation, prosecution and adjudication in relation to electronic crimes.
  • 23. 23 Law in Information Security (Cont..) Information Security Laws and Regulations Prevention of Electronic Crimes Act, 2016: • Section 21 provides that use of electronic means that may result in reputational damage or breach of privacy shall be punishable with imprisonment of up to 7 years or with which may extend up to 5 million rupees or both.
  • 24. 24 Law in Information Security (Cont..) Information Security Laws and Regulations Prevention of Electronic Crimes Act, 2016: • Under Section 22, punishment of up to seven years or fine up to 5 million rupees or both has been prescribed for the offence of producing, distributing or transmitting pornographic material showing underage girls engaged in sexually explicit conduct.
  • 25. 25 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? • Here are 3 of the most known cybersecurity regulations and the key steps to comply with them:
  • 26. 26 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? GDPR: • Identify the personal data you process and why you process it. • Obtain explicit consent from individuals to collect and use their data. • Appoint a Data Protection Officer (DPO) if necessary.
  • 27. 27 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? GDPR: • Implement appropriate security measures to protect personal data. • Ensure that data processors comply with the GDPR. • Conduct Data Protection Impact Assessments (DPIAs) for high-risk processing activities.
  • 28. 28 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? GDPR: • Implement procedures for responding to data breaches. • Educate employees on GDPR compliance. • Maintain detailed records of data processing activities. • Cooperate with data protection authorities in the event of an investigation or audit.
  • 29. 29 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? HIPAA: • Implementing administrative, physical, and technical safeguards to protect patient information. • Appointing a HIPAA privacy officer to oversee compliance.
  • 30. 30 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? HIPAA: • Conducting regular risk assessments to identify potential vulnerabilities and areas for improvement. • Developing and implementing policies and procedures for data security and breach notification.
  • 31. 31 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? HIPAA: • Providing ongoing staff training on HIPAA regulations and security best practices. • Establishing a contingency plan for responding to security incidents or breaches. • Ensuring that business associates, such as vendors or contractors, are also HIPAA compliant.
  • 32. 32 Law in Information Security (Cont..) How to comply with multiple cybersecurity regulations? PCI DSS: • Build and maintain a secure network. • Protect cardholder data. • Maintain a vulnerability management program. • Implement strong access control measures. • Regularly monitor and test networks. • Maintain an information security policy.
  • 33. 33 Questions Any Question Please? You can contact me at: drshafiq@uosahiwal.edu.pk Your Query will be answered within one working day.
  • 34. 34 Further Readings • Chapter No. 1 Computer_Security_Principles_and_Practice_(3rd_E dition) By William Stallings and Lawrie Brown