SlideShare a Scribd company logo
3
Most read
5
Most read
23
Most read
Legal, Ethical and professional issues in Information Security
Principles of Information Security, 2nd Edition 2
Introduction
 You must understand scope of an organization’s legal and
ethical responsibilities
 To minimize liabilities/reduce risks, the information
security practitioner must:
 Understand current legal environment
 Stay current with laws and regulations
 Watch for new issues that emerge
Principles of Information Security, 2nd Edition 3
Law and Ethics in Information Security
 Laws: rules that mandate or prohibit certain societal
behavior
 Ethics: define socially acceptable behavior
 Cultural mores: fixed moral attitudes or customs of a
particular group; ethics based on these
 Laws carry sanctions of a governing authority; ethics do not
Organizational Liability and need of Council
 Liability:
Legal obligation of an entity that extends beyond
criminal or contract law.
 Includes obligation to make restitution, or compensate
for, wrongs committed by an organization or its
employees.
4
Organizational Liability and need of Council
 Due care**
 Must ensure that every employee knows
 what is acceptable or unacceptable behavior ,consequences of illegal or
unethical actions.
 Due diligence**
 Requires the organization to make a valid effort to protect others continually
maintain this level of effort.
 Jurisdiction**
 A court's right to hear a case if a wrong was committed in its territory, or
involves its citizenry
 Long arm jurisdiction**
 To draw an accused individual into its court systems from around the world
or across the country.
5
Principles of Information Security, 2nd Edition 6
Types of Law
 Civil
 Criminal
 Private
 Public
Principles of Information Security, 2nd Edition 7
Relevant U.S. Laws (General)
 Computer Fraud and Abuse Act of 1986 (CFAAct)
 National Information Infrastructure Protection Act of 1996
 USA Patriot Act of 2001
 Telecommunications Deregulation and Competition Act
of 1996
 Communications Decency Act of 1996 (CDA)
 Computer Security Act of 1987
Principles of Information Security, 2nd Edition 8
Privacy
 One of the hottest topics in information security
 Is a “state of being free from unsanctioned intrusion”
 Ability to aggregate data from multiple sources allows
creation of information databases previously unheard of
Principles of Information Security, 2nd Edition 9
Export and Espionage Laws
 Economic Espionage Act of 1996 (EEA)
 Security And Freedom Through Encryption Act of 1999
(SAFE)
Principles of Information Security, 2nd Edition 10
U.S. Copyright Law
 Intellectual property is recognized as a protected asset in
the U.S.; copyright law extends to electronic formats.
 With proper acknowledgment, permissible to include
portions of others’ work as a reference.
 As long as proper acknowledgment is provided to the
original author, it is entirely permissible.
Principles of Information Security, 2nd Edition 11
Freedom of Information Act of 1966 (FOIA)
 Allows access to federal agency records or information
not determined to be matter of national security
 U.S. government agencies required to disclose any
requested information upon receipt of written request
 Some information protected from disclosure
Principles of Information Security, 2nd Edition 12
State and Local Regulations
 Restrictions on organizational computer technology use
exist at international, national, state, local levels
 Information security professional responsible for
understanding state regulations and ensuring
organization is compliant with regulations
Principles of Information Security, 2nd Edition 13
International Laws and Legal Bodies
 European Council Cyber-Crime Convention:
 Establishes international task force overseeing Internet
security functions for standardized international
technology laws
 Attempts to improve effectiveness of international
investigations into breaches of technology law
 Well received by intellectual property rights advocates due
to emphasis on copyright infringement prosecution
 Lacks realistic provisions for enforcement
14
International Laws and Legal Bodies
 Few international laws relating to privacy and information
security.
 European Council Cyber-Crime Convention
 2001. Creates an international task force
 Improve the effectiveness of international investigations
 Emphasis on copyright infringement prosecution
 Lacks realistic provisions for enforcement
 WTO Agreement on Intellectual Property Rights
 Intellectual property rules for the multilateral trade systems.
 Digital Millennium Copyright Act**
 U.S. contribution to international effort to reduce impact of
copyright, trademark, and privacy infringement .
15
Policy Versus Law
 Most organizations develop and formalize a body of
expectations called policy
 Policies serve as organizational laws
 To be enforceable, policy:
 Disseminate.
 Reviewed.
 Comprehend.
 Compliance.
Principles of Information Security, 2nd Edition 16
Ethics and Information Security
“thou Shalt” is known for “you shall”
Principles of Information Security, 2nd Edition 17
Ethical Differences Across Cultures
 Cultural differences create difficulty in determining what is
and is not ethical
 Difficulties arise when one nationality’s ethical behavior
conflicts with ethics of another national group
 Example: many of ways in which Asian cultures use
computer technology is software piracy
Principles of Information Security, 2nd Edition 18
Ethics and Education
 Overriding factor in leveling ethical perceptions within a
small population is education
 Employees must be trained in expected behaviors of an
ethical employee, especially in areas of information
security
 Proper ethical training vital to creating informed, well
prepared, and low-risk system user
Principles of Information Security, 2nd Edition 19
Deterrence (‫تھام‬ ‫)روک‬ to Unethical and Illegal
Behavior
 Deterrence: best method for preventing an illegal or
unethical activity; e.g., laws, policies, technical controls
 Laws and policies only deter if three conditions are
present:
 Fear of penalty
 Probability of being caught
 Probability of penalty being administered
Principles of Information Security, 2nd Edition 20
Codes of Ethics and Professional Organizations
 Several professional organizations have established
codes of conduct/ethics
 Codes of ethics can have positive effect; unfortunately,
many employers do not encourage joining of these
professional organizations
 Responsibility of security professionals to act ethically
and according to policies of employer, professional
organization, and laws of society
Major IT Professional Organizations and Ethics
 Association for Computing Machinery (ACM)
 promotes education and provides discounts for students
 educational and scientific computing society
 International Information Systems Security Certification Consortium (ISC2)
 develops and implements information security certifications and
credentials
 System Administration, Networking, and Security Institute (SANS)
 Global Information Assurance Certifications (GIAC)
 Information Systems Audit and Control Association (ISACA)
 focus on auditing, control and security
 Computer Security Institute (CSI)
 sponsors education and training for information security
 Information Systems Security Association (ISSA)
 information exchange and educational development for information
security practitioners
21
Principles of Information Security, 2nd Edition 22
Key U.S. Federal Agencies
 Department of Homeland Security (DHS)
 Federal Bureau of Investigation’s National Infrastructure
Protection Center (NIPC)
 National Security Agency (NSA)
 U.S. Secret Service
Principles of Information Security, 2nd Edition 23
Organizational Liability(‫داری‬ ‫)ذمہ‬ and the
Need for Counsel
 Liability is legal obligation of an entity; includes legal
obligation to make restitution for wrongs committed
 Organization increases liability if it refuses to take
measures known as due care
 Due diligence requires that an organization make valid
effort to protect others and continually maintain that level
of effort
Principles of Information Security, 2nd Edition 24
Summary
 Many organizations have codes of conduct and/or codes
of ethics
 Organization increases liability if it refuses to take
measures known as due care
 Due diligence requires that organization make valid effort
to protect others and continually maintain that effort

More Related Content

PPTX
Legal, Ethical, and Professional Issues In Information Security
PPTX
Law and Ethics in Information Security.pptx
PPTX
02 Legal, Ethical, and Professional Issues in Information Security
PPTX
Legal and ethical aspects
 
PPTX
Legal and Ethical Implications of Cybersecurity.pptx
PPT
Introduction to information security
PPT
Chapter 5 Planning for Security-students.ppt
PDF
Human Factors in Cyber Security: User authentication as a use case
Legal, Ethical, and Professional Issues In Information Security
Law and Ethics in Information Security.pptx
02 Legal, Ethical, and Professional Issues in Information Security
Legal and ethical aspects
 
Legal and Ethical Implications of Cybersecurity.pptx
Introduction to information security
Chapter 5 Planning for Security-students.ppt
Human Factors in Cyber Security: User authentication as a use case

What's hot (20)

PDF
Cyber Security Vulnerabilities
PPTX
Network security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Introduction to Information Security
PPT
IoT security (Internet of Things)
PPT
Information security management
PPTX
The CIA triad.pptx
PPT
Information Security
PPTX
Intrusion detection
 
PPT
Information security and Attacks
PPT
Information Security Principles - Access Control
PPTX
Cryptography and Information Security
PDF
IP Security
PPTX
CYBER SECURITY :Cyber Law – The Legal Perspectives
PPTX
Cryptography and network security
PPTX
Symmetric and asymmetric key
PPSX
Security policies
PDF
Chapter 11 laws and ethic information security
PPTX
Security risk management
PPTX
Information security management system
Cyber Security Vulnerabilities
Network security
Network security (vulnerabilities, threats, and attacks)
Introduction to Information Security
IoT security (Internet of Things)
Information security management
The CIA triad.pptx
Information Security
Intrusion detection
 
Information security and Attacks
Information Security Principles - Access Control
Cryptography and Information Security
IP Security
CYBER SECURITY :Cyber Law – The Legal Perspectives
Cryptography and network security
Symmetric and asymmetric key
Security policies
Chapter 11 laws and ethic information security
Security risk management
Information security management system
Ad

Similar to Legal, Ethical and professional issues in Information Security (20)

PDF
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
PPT
chapter chapter chapter chapter chapter 03.ppt
PPT
Chapter3.ppt
PPT
whitman_ch04.ppt
PPTX
Chapter 3 - Lesson 1.pptx
PPT
Principles of information security ch03_1.ppt
PPT
Chapter 3 Principles of Info Security.ppt
PPT
lesson333.ppt
PPT
Ch01_Introduction_to_Information_Securit.ppt
PPT
Ch01_Introduction_to_Information_Securit.ppt
PPT
Ch01_Introduction_to_Information_Securit.ppt
PPT
Ch01_Introduction_to_Information_Securit
PPT
Ethics in IT Security
PDF
Lecture 8.pdf
PPTX
Chapter 3 - Lesson 2.pptx
PPT
Lesson 2-Identify Theft
PPT
Information Assurance And Security - Chapter 3 - Lesson 2
PPT
Lesson 1- Laws and Ethics
ch03-Legal- Ethica and Professional Issues in IS (7-8).pdf
chapter chapter chapter chapter chapter 03.ppt
Chapter3.ppt
whitman_ch04.ppt
Chapter 3 - Lesson 1.pptx
Principles of information security ch03_1.ppt
Chapter 3 Principles of Info Security.ppt
lesson333.ppt
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit.ppt
Ch01_Introduction_to_Information_Securit
Ethics in IT Security
Lecture 8.pdf
Chapter 3 - Lesson 2.pptx
Lesson 2-Identify Theft
Information Assurance And Security - Chapter 3 - Lesson 2
Lesson 1- Laws and Ethics
Ad

Recently uploaded (20)

PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
An Unlikely Response 08 10 2025.pptx
PPTX
worship songs, in any order, compilation
PPTX
Introduction to Effective Communication.pptx
PPTX
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
PDF
Instagram's Product Secrets Unveiled with this PPT
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
Hydrogel Based delivery Cancer Treatment
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PPTX
Human Mind & its character Characteristics
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
DOC
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
PPTX
nose tajweed for the arabic alphabets for the responsive
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PPTX
Tour Presentation Educational Activity.pptx
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
2025-08-10 Joseph 02 (shared slides).pptx
Swiggy’s Playbook: UX, Logistics & Monetization
An Unlikely Response 08 10 2025.pptx
worship songs, in any order, compilation
Introduction to Effective Communication.pptx
INTERNATIONAL LABOUR ORAGNISATION PPT ON SOCIAL SCIENCE
Instagram's Product Secrets Unveiled with this PPT
Tablets And Capsule Preformulation Of Paracetamol
Hydrogel Based delivery Cancer Treatment
_ISO_Presentation_ISO 9001 and 45001.pptx
Human Mind & its character Characteristics
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
nose tajweed for the arabic alphabets for the responsive
Emphasizing It's Not The End 08 06 2025.pptx
BIOLOGY TISSUE PPT CLASS 9 PROJECT PUBLIC
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
Tour Presentation Educational Activity.pptx
Intro to ISO 9001 2015.pptx wareness raising
2025-08-10 Joseph 02 (shared slides).pptx

Legal, Ethical and professional issues in Information Security

  • 2. Principles of Information Security, 2nd Edition 2 Introduction  You must understand scope of an organization’s legal and ethical responsibilities  To minimize liabilities/reduce risks, the information security practitioner must:  Understand current legal environment  Stay current with laws and regulations  Watch for new issues that emerge
  • 3. Principles of Information Security, 2nd Edition 3 Law and Ethics in Information Security  Laws: rules that mandate or prohibit certain societal behavior  Ethics: define socially acceptable behavior  Cultural mores: fixed moral attitudes or customs of a particular group; ethics based on these  Laws carry sanctions of a governing authority; ethics do not
  • 4. Organizational Liability and need of Council  Liability: Legal obligation of an entity that extends beyond criminal or contract law.  Includes obligation to make restitution, or compensate for, wrongs committed by an organization or its employees. 4
  • 5. Organizational Liability and need of Council  Due care**  Must ensure that every employee knows  what is acceptable or unacceptable behavior ,consequences of illegal or unethical actions.  Due diligence**  Requires the organization to make a valid effort to protect others continually maintain this level of effort.  Jurisdiction**  A court's right to hear a case if a wrong was committed in its territory, or involves its citizenry  Long arm jurisdiction**  To draw an accused individual into its court systems from around the world or across the country. 5
  • 6. Principles of Information Security, 2nd Edition 6 Types of Law  Civil  Criminal  Private  Public
  • 7. Principles of Information Security, 2nd Edition 7 Relevant U.S. Laws (General)  Computer Fraud and Abuse Act of 1986 (CFAAct)  National Information Infrastructure Protection Act of 1996  USA Patriot Act of 2001  Telecommunications Deregulation and Competition Act of 1996  Communications Decency Act of 1996 (CDA)  Computer Security Act of 1987
  • 8. Principles of Information Security, 2nd Edition 8 Privacy  One of the hottest topics in information security  Is a “state of being free from unsanctioned intrusion”  Ability to aggregate data from multiple sources allows creation of information databases previously unheard of
  • 9. Principles of Information Security, 2nd Edition 9 Export and Espionage Laws  Economic Espionage Act of 1996 (EEA)  Security And Freedom Through Encryption Act of 1999 (SAFE)
  • 10. Principles of Information Security, 2nd Edition 10 U.S. Copyright Law  Intellectual property is recognized as a protected asset in the U.S.; copyright law extends to electronic formats.  With proper acknowledgment, permissible to include portions of others’ work as a reference.  As long as proper acknowledgment is provided to the original author, it is entirely permissible.
  • 11. Principles of Information Security, 2nd Edition 11 Freedom of Information Act of 1966 (FOIA)  Allows access to federal agency records or information not determined to be matter of national security  U.S. government agencies required to disclose any requested information upon receipt of written request  Some information protected from disclosure
  • 12. Principles of Information Security, 2nd Edition 12 State and Local Regulations  Restrictions on organizational computer technology use exist at international, national, state, local levels  Information security professional responsible for understanding state regulations and ensuring organization is compliant with regulations
  • 13. Principles of Information Security, 2nd Edition 13 International Laws and Legal Bodies  European Council Cyber-Crime Convention:  Establishes international task force overseeing Internet security functions for standardized international technology laws  Attempts to improve effectiveness of international investigations into breaches of technology law  Well received by intellectual property rights advocates due to emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement
  • 14. 14 International Laws and Legal Bodies  Few international laws relating to privacy and information security.  European Council Cyber-Crime Convention  2001. Creates an international task force  Improve the effectiveness of international investigations  Emphasis on copyright infringement prosecution  Lacks realistic provisions for enforcement  WTO Agreement on Intellectual Property Rights  Intellectual property rules for the multilateral trade systems.  Digital Millennium Copyright Act**  U.S. contribution to international effort to reduce impact of copyright, trademark, and privacy infringement .
  • 15. 15 Policy Versus Law  Most organizations develop and formalize a body of expectations called policy  Policies serve as organizational laws  To be enforceable, policy:  Disseminate.  Reviewed.  Comprehend.  Compliance.
  • 16. Principles of Information Security, 2nd Edition 16 Ethics and Information Security “thou Shalt” is known for “you shall”
  • 17. Principles of Information Security, 2nd Edition 17 Ethical Differences Across Cultures  Cultural differences create difficulty in determining what is and is not ethical  Difficulties arise when one nationality’s ethical behavior conflicts with ethics of another national group  Example: many of ways in which Asian cultures use computer technology is software piracy
  • 18. Principles of Information Security, 2nd Edition 18 Ethics and Education  Overriding factor in leveling ethical perceptions within a small population is education  Employees must be trained in expected behaviors of an ethical employee, especially in areas of information security  Proper ethical training vital to creating informed, well prepared, and low-risk system user
  • 19. Principles of Information Security, 2nd Edition 19 Deterrence (‫تھام‬ ‫)روک‬ to Unethical and Illegal Behavior  Deterrence: best method for preventing an illegal or unethical activity; e.g., laws, policies, technical controls  Laws and policies only deter if three conditions are present:  Fear of penalty  Probability of being caught  Probability of penalty being administered
  • 20. Principles of Information Security, 2nd Edition 20 Codes of Ethics and Professional Organizations  Several professional organizations have established codes of conduct/ethics  Codes of ethics can have positive effect; unfortunately, many employers do not encourage joining of these professional organizations  Responsibility of security professionals to act ethically and according to policies of employer, professional organization, and laws of society
  • 21. Major IT Professional Organizations and Ethics  Association for Computing Machinery (ACM)  promotes education and provides discounts for students  educational and scientific computing society  International Information Systems Security Certification Consortium (ISC2)  develops and implements information security certifications and credentials  System Administration, Networking, and Security Institute (SANS)  Global Information Assurance Certifications (GIAC)  Information Systems Audit and Control Association (ISACA)  focus on auditing, control and security  Computer Security Institute (CSI)  sponsors education and training for information security  Information Systems Security Association (ISSA)  information exchange and educational development for information security practitioners 21
  • 22. Principles of Information Security, 2nd Edition 22 Key U.S. Federal Agencies  Department of Homeland Security (DHS)  Federal Bureau of Investigation’s National Infrastructure Protection Center (NIPC)  National Security Agency (NSA)  U.S. Secret Service
  • 23. Principles of Information Security, 2nd Edition 23 Organizational Liability(‫داری‬ ‫)ذمہ‬ and the Need for Counsel  Liability is legal obligation of an entity; includes legal obligation to make restitution for wrongs committed  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that an organization make valid effort to protect others and continually maintain that level of effort
  • 24. Principles of Information Security, 2nd Edition 24 Summary  Many organizations have codes of conduct and/or codes of ethics  Organization increases liability if it refuses to take measures known as due care  Due diligence requires that organization make valid effort to protect others and continually maintain that effort