Monday, April 29, 2019

Law And Case Policy Case Study Example | Topics and Well Written Essays - 1000 words

constabulary And Policy - Case Study ExampleAn examination of the present legal environment reveals the effectiveness of policies in safeguarding strain development and training systems. More than ever before, businesses are rapidly globalizing their operations due to the working out of e-commerce abilities. This has resulted in the emergence of robust study systems that encompass vast quantities of business-related knowledge. As a consequence, businesses have increasingly started depending on third-party vendors for diverse business operations, posing immense challenges to information security. Vendors such as contractors need to ensure protection of valuable customer data. Complex systems are needed to handle these complex business opportunities and challenges. Consequently, information security policies are essential to effective everyday business operations. Policies encompass both government polices and organizational polices. With regard to government policies, the US is renowned for its development and implementation of robust information security canon to deter exploitation and misuse of information and information systems and technology. Such legislation provides a reliable business environment, ensuring a stable economy (IT Governance Institute, 2004). Prominent government policies on information security complicate the 1986 Computer Fraud and Abuse Act (CFA Act), which is the foundation of most computer and information-related federal laws. The 1996 National learning Infrastructure Protection Act amended the 1986 law, increasing penalties for information-related crimes. The degree of the penalties imposed depends on the essence of the information acquired and used and whether or not the information-related offense was committed for commercial advantage, personal financial gain or the perpetuation of a criminal act, for instance, fraud. The US Patriotic Act has modified various laws, allowing greater parallel to law enforcement agencies in determine to deter terrorism-related activities that encompass the use of information and information system for instance, making information available for terrorist activities. However, perhaps some of the most important government legislation that govern information dissemination, confidentiality and integrity include the 1996 Telecommunications Deregulation and Competition Act, which regulates telecommunications, both foreign and interstate (IT Governance Institute, 2004). Additionally, the 1966 Freedom of culture Act facilitates disclosure of formerly unreleased documents or information controlled by the government, for instance, tax records. In order to protect businesses against illegal access to stored information on business and personal communications, the government established the illicit Access to Stored Communications. This law is particularly important since it deters access and dissemination of business and personal communications, especially those carrying sprin gy business details. The Computer Fraud and Abuse Act, which was last amended in 2006, helps to deter computer-related acts of unlawful information use, dissemination and access (IT Governance In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.