Legal Issues in Information Security

(jbl-info-security) / ISBN : 978-1-61691-846-0
Lessons
TestPrep
Get A Free Trial

Skills You’ll Get

1

Welcome to Legal Issues in Information Security

  • Learning Resources
  • Pacing Guide
2

Information Security Overview

  • Why Is Information Security an Issue?
  • What Is Information Security?
  • Basic Information Security Concepts
  • What Are Common Information Security Concerns?
  • Do Different Types of Information Require Different Types of Protection?
  • What Are the Mechanisms that Ensure Information Security?
  • Do Special Kinds of Data Require Special Kinds of Protection?
  • Lesson Summary
3

Privacy Overview

  • Why Is Privacy an Issue?
  • What Is Privacy?
  • How Is Privacy Different from Information Security?
  • What Are the Sources of Privacy Law?
  • What Are Threats to Personal Data Privacy in the Information Age?
  • What Is Workplace Privacy?
  • What Are General Principles for Privacy Protection in Information Systems?
  • Lesson Summary
4

The American Legal System

  • The American Legal System
  • Sources of American Law
  • Types of Law
  • The Role of Precedent
  • Regulatory Authorities
  • What Is the Difference Between Compliance and Audit?
  • How Do Security, Privacy, and Compliance Fit Together?
  • Lesson Summary
5

Security and Privacy of Consumer Financial Information

  • Business Challenges Facing Financial Institutions
  • The Different Types of Financial Institutions
  • Consumer Financial Information
  • Who Regulates Financial Institutions?
  • The Federal Financial Institutions Examination Council (FFIEC)
  • The Gramm-Leach-Bliley Act
  • Federal Trade Commission Red Flags Rule
  • Payment Card Industry Standards
  • Case Studies and Examples
  • Lesson Summary
6

Security and Privacy of Information Belonging to Children and in Educational Records

  • Challenges in Protecting Children on the Internet
  • Children's Online Privacy Protection Act
  • Children's Internet Protection Act (CIPA)
  • Family Educational Rights and Privacy (FERPA)
  • Case Studies and Examples
  • Lesson Summary
7

Security and Privacy of Health Information

  • Business Challenges Facing the Health Care Industry
  • Why Is Health Care Information So Sensitive?
  • The Health Insurance Portability and Accountability Act
  • The Role of State Laws Protecting Medical Records
  • Case Studies and Examples
  • Lesson Summary
8

Corporate Information Security and Privacy Regulation

  • The Enron Scandal and Securities-Law Reform
  • Why Is Accurate Financial Reporting Important?
  • The Sarbanes-Oxley Act of 2002
  • Compliance and Security Controls
  • SOX Influence in Other Types of Companies
  • Corporate Privacy Issues
  • Case Studies and Examples
  • Lesson Summary
9

Federal Government Information Security and Privacy Regulations

  • Information Security Challenges Facing the Federal Government
  • The Federal Information Security Management Act
  • Protecting Privacy in Federal Information Systems
  • Import and Export Control Laws
  • Case Studies and Examples
  • Lesson Summary
10

State Laws Protecting Citizen Information and Breach Notification Laws

  • History of State Actions to Protect Personal Information
  • Breach Notification Regulations
  • Data-Specific Security and Privacy Regulations
  • Encryption Regulations
  • Data Disposal Regulations
  • Case Studies and Examples
  • Lesson Summary
11

Intellectual Property Law

  • The Digital Wild West and the Importance of Intellectual Property Law
  • Legal Ownership and the Importance of Protecting Intellectual Property
  • Patents
  • Trademarks
  • Copyright
  • Protecting Copyrights Online—The Digital Millennium Copyright Act (DMCA)
  • Case Studies and Examples
  • Lesson Summary
12

The Role of Contracts

  • General Contracting Principles
  • Contracting Online
  • Special Types of Contracts in Cyberspace
  • How Do These Contracts Regulate Behavior?
  • Emerging Contract Law Issues
  • Case Studies and Examples
  • Lesson summary
13

Criminal Law and Tort Law Issues in Cyberspace

  • General Criminal Law Concepts
  • Common Criminal Laws Used in Cyberspace
  • General Tort Law Concepts
  • Common Tort Law Actions in Cyberspace
  • Case Studies and Examples
  • Lesson summary
14

Information Security Governance

  • What Is Information Security Governance?
  • Information Security Governance Documents
  • Recommended Information Security Policies
  • Case Studies and Examples
  • Lesson Summary
15

Risk Analysis, Incident Response, and Contingency Planning

  • Contingency Planning
  • Risk Management
  • Three Types of Contingency Planning
  • Special Considerations
  • Lesson Summary
16

Computer Forensics and Investigations

  • What Is Computer Forensics?
  • What Is the Role of a Computer Forensic Examiner?
  • Collecting, Handling, and Using Digital Evidence
  • Legal Issues Involving Digital Evidence
  • Additional Ethics Links
  • Lesson Summary
A

Appendix A

  • Standard Acronyms
B

Appendix B

  • Law and Case Citations
C

Appendix C

  • The Constitution of the United States of America

Legal Issues in Information Security

$103.00

Buy Now
scroll to top