Chat with us, powered by LiveChat what key U.S. laws are of interest to information security professionals. - EssayAbode

what key U.S. laws are of interest to information security professionals.

Using Table 2-1, what key U.S. laws are of interest to information security professionals. Do you feel all of these laws are appropriate and  necessary? Justify your opinion with at least 2 resources that you cite in APA style.

 

Minimum 250 words (excluding citations).

 

You are required to respond to one student (minimum 100 words excluding citations) engaging in their post to further the discussion

 

Relevant U.S. Laws Key Terms

 

Computer Fraud and Abuse (CFA) Act The cornerstone of many computer-related federal laws and enforcement efforts, the CFA formally criminalizes “accessing a computer without authorization or exceeding authorized access” for systems containing information of national interest as determined by the U.S. government.

 

Computer Security Act (CSA) A U.S. law designed to improve security of federal information systems. It charged the National Bureau of Standards, now NIST, with the development of standards, guidelines, and associated methods and techniques for computer systems, among other responsibilities. Electronic

 

Communications Privacy Act (ECPA) of 1986 A collection of statutes that regulate the interception of wire, electronic, and oral communications. These statutes are frequently referred to as the “federal wiretapping acts.”

 

Health Insurance Portability and Accountability Act (HIPAA) of 1996 Also known as the Kennedy-Kassebaum Act, this law attempts to protect the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.

 

Privacy Act of 1974 A federal law that regulates the government’s collection, storage, use, and dissemination of individual personal information contained in records maintained by the federal government. The United States has led the development and implementation

 

Whitman, Michael E.; Mattord, Herbert J.. Management of Information Security (p. 79). Cengage Learning. Kindle Edition.

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing