Monday, September 9, 2019

Law And Case Policy Case Study Example | Topics and Well Written Essays - 1000 words

Law And Policy - Case Study Example An examination of the present legal environment reveals the effectiveness of policies in safeguarding business information and information systems. More than ever before, businesses are rapidly globalizing their operations due to the expansion of e-commerce abilities. This has resulted in the emergence of robust information systems that encompass vast quantities of business-related information. As a consequence, businesses have increasingly started depending on third-party vendors for diverse business operations, posing immense challenges to information security. Vendors such as contractors need to guarantee protection of valuable customer data. Complex systems are needed to handle these complex business opportunities and challenges. Consequently, information security policies are essential to effective everyday business operations. Policies encompass both government polices and organizational polices. With regard to government policies, the US is renowned for its development and imp lementation of robust information security legislation to deter exploitation and misuse of information and information systems and technology. Such legislation provides a reliable business environment, ensuring a stable economy (IT Governance Institute, 2004). Prominent government policies on information security include the 1986 Computer Fraud and Abuse Act (CFA Act), which is the foundation of most computer and information-related federal laws. The 1996 National Information Infrastructure Protection Act amended the 1986 law, increasing penalties for information-related crimes. The degree of the penalties imposed depends on the essence of the information acquired and used and whether or not the information-related offense was committed for commercial advantage, personal financial gain or the perpetuation of a criminal act, for instance, fraud. The US Patriotic Act has modified various laws, allowing greater latitude to law enforcement agencies in order to deter terrorism-related ac tivities that encompass the use of information and information system; for instance, making information available for terrorist activities. However, perhaps some of the most important government legislation that govern information dissemination, confidentiality and integrity include the 1996 Telecommunications Deregulation and Competition Act, which regulates telecommunications, both foreign and interstate (IT Governance Institute, 2004). Additionally, the 1966 Freedom of Information Act facilitates disclosure of formerly unreleased documents or information controlled by the government, for instance, tax records. In order to protect businesses against illegal access to stored information on business and personal communications, the government established the Unlawful Access to Stored Communications. This law is particularly important since it deters access and dissemination of business and personal communications, especially those carrying vital business details. The Computer Fraud and Abuse Act, which was last amended in 2006, helps to deter computer-related acts of unlawful information use, dissemination and access (IT Governance In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.