StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security: Law and Policy - Case Study Example

Cite this document
Summary
Information security is critical and necessary within any organization. This is because, organization information is a critical asset in that it needs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Information Security: Law and Policy
Read Text Preview

Extract of sample "Information Security: Law and Policy"

Law and Policy Case Study Legal policies are detrimental for any organization to comply with before it sets up or it implements any new system in place. Information security is critical and necessary within any organization. This is because, organization information is a critical asset in that it needs to be accurate, relevant, timely and should be properly protected from any unauthorized access to it. The organization should demonstrate commitment to ensure that its system adhere to legal policies and guidelines as set out by the organization and the government. The aim of the document is to highlight the legal environment such as laws, regulations and policies and its impact upon how an organization puts measures to achieve information and information systems confidentiality, integrity and availability. Information security in an organization involves ensuring that only people with rights to read, change, broadcast and use it have access to it. Different organizations have their own policies which guide the implementation of any new system. Policies in an organization need employees to comply with them. Policies describe the rules and procedures for organization employ to comply with (Kiefer, Wu, Wilson & Sabett 2004). The need for information security is to primarily protect information from any unauthorized party. Several threats can pose to make information insecure. There is a need to ensure information is secure while ensuring that the policies and legal guidelines of the organization and the surrounding environment are adhered with (Kiefer, Wu, Wilson & Sabett 2004). Government and organizational policies dictate the implementation of an information security system. The government policies are determined and issued to organizations depending on the type or kind of governing environment within the organization’s operation. The government can be federal, state, local or tribal. The on the type of the business industry, the government policies act as a framework for organizations’ administration or management to comply with in order to secure information and information systems (Straub, Goodman & Baskerville 2008). The need for government policies is to control and regulate the relevant market in order to avoid conflicts which might arise among the industry players. The government policies give a procedure and guidelines for organizational governments to follow when implementing information security systems. Organization policies are devised by the organization as a guideline when implementing a new system. The policies are devised to ensure that laws, regulations and policies are complied to. The policies provide a framework for relevant restrictions and privileges for use of information for every employ. The organization policies strive to ensure that people and information are protected (Straub, Goodman & Baskerville 2008). This is normally accomplished by setting the rules for access of information for each and every employee use of information (Straub, Goodman & Baskerville 2008). Organizational policies assists the organization in complying with governmental policies in order to avoid violation of the latter’s policies. The policies include the rules which control the actions of information users and management. The policies include authorization privileges for use of information, need for probe, monitoring and investigation on the use of information. The policies also include information infringement consequences, the information security baseline position by the organization. The policies restrict users from accessing what they are not supposed to in order to reduce risk and tampering of information (Straub, Goodman & Baskerville 2008). Organizations need information security policies in order to eradicate or minimize any looming risks associated with the use of information. The eminent risks can be unauthorized access to organization information either internally or externally. The policies set the laws required before the use of any information or implementation of an information security system (Kiefer, Wu, Wilson & Sabett 2004). The policies ensure every information user has a responsibility for the use of information and the consequences in case of any violation of laws. The policies also regulate the use of information among the industry organization as set out by the government. Any organization which needs to set up a new information security systems need to comply with the government policies to avoid industry crisis or conflicts. The organization policies ensure that information users comply fully with the use of organizational information policies. The side of regulations should also be considered in an organization when implementing information security system. According to Stamp, regulations are rules, laws or orders determining how an action has to be taken or done. In information security, regulation involves coming up or devising enforcement security control mechanisms aimed at minimizing or reducing risks associated with the use of information. The organization management comes up with the regulations to be adhered to by every user of information. This is aimed at ensuring that information security is adequately achieved. The regulation gives a guideline to users on what is to be accessed and not (Stamp 2009). The laws are part of mechanisms in to be followed by organizations when it comes to information security. According to Gifford, laws are made by governing bodies to give a guideline on how to govern behavior (Gifford 2009). Organizational laws control the behavior of information users in order to maintain and safeguard information security. Laws seek to protect the privacy of information users and also between organizational users and the organization. Also laws are involved between the organizational and the government. They ensure that proper use of information and information security practices are complied to. Every information user should be aware of the laws before use of information. In understanding of fair practices, government seeks to regulate information security practices. Policies, regulations and laws are detrimental when devising a new system within an organization environment. The three aspects are part of necessary requirements which ensure that information security procedures are followed accordingly to ensure information is not tampered to. They also aim at eliminating any disagreement or violations which might be associated with the use of information. The legal environment will be conducive including the business environment if the three aspects are followed to in order to avoid any misunderstanding among the involved parties. References Gifford, G. (2009). Information security: Managing the legal risks. Retrieved 18th November, 2012 from http://books.google.com/books?id=38BqS-mwDo8C&pg=PA312&dq=information+security+legal+practises&hl=sw&sa=X&ei=GS6pUMDSIILJtAbI34Fw&ved=0CDMQ6AEwAQ#v=onepage&q=information%20security%20legal%20practises&f=false Kiefer, K., Wu, S., Wilson, B., & Sabett, R. (2004). Information Security: A Legal, Business and Technical Handbook. ABA, Illinois. Stamp, M. (2011). Information Security: Principles and Practice. John Wiley & Sons Inc. Hoboken, New Jersey. Straub, D., W., Goodman, S., & Baskerville, R. (2008). Information Security: Policy, Processes and Practices. M.E Sharpe, Inc. New York. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Information Security: Law and Policy Case Study Example | Topics and Well Written Essays - 750 words - 4, n.d.)
Information Security: Law and Policy Case Study Example | Topics and Well Written Essays - 750 words - 4. https://studentshare.org/information-technology/1787575-law-and-policy-case-study
(Information Security: Law and Policy Case Study Example | Topics and Well Written Essays - 750 Words - 4)
Information Security: Law and Policy Case Study Example | Topics and Well Written Essays - 750 Words - 4. https://studentshare.org/information-technology/1787575-law-and-policy-case-study.
“Information Security: Law and Policy Case Study Example | Topics and Well Written Essays - 750 Words - 4”. https://studentshare.org/information-technology/1787575-law-and-policy-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security: Law and Policy

Current Criminal Justice or Security Policy Issue

In implementing this policy, the agency needs to bear in mind the issues with regards the choice of body armor to purchase.... Thus, in implementing this policy, the agency decided that the Kevlar armor, National Institute of Justice certified vests, will be used but only for a limited period of time.... For the effective implementation of this policy, guidelines in wearing the vests will be provided for in writing to the officers involved.... According to the report by the Department of Justice, body armor or life vests have saved the lives of more than 2,700 law enforcers....
5 Pages (1250 words) Essay

Protection of Private Information

According to the directive, member nations were not allowed to enact a weaker policy though a stricter law was allowed.... New Zealand has amended the Privacy Act 1993 in December 2000 to secure a revelation by the European Commission that New Zealand's privacy protection policy is adequate according to Article 25 of the Data Protection Directive of the European Union.... The amendment was passed when New Zealand's Privacy Act is applauded as the most detailed national privacy policy maintained outside the European continent....
3 Pages (750 words) Assignment

Workplace Policy Project

International Privacy Policies exist for customers outside the United States which are dependent on the laws of the country that govern their relationship with Wells Fargo This policy describes how the company utilizes and protects the customers' information.... This policy was aimed at protecting information pertaining to individuals' business accounts, loans, leasing and sales programs among others.... To protect the customers' personal information from any form of unauthorized access, the company uses security measures that are required to be in compliance with federal law....
5 Pages (1250 words) Research Paper

Information Sensitivity and Protection of Data (CASE) module 5

According to Jarrell, Welker, Silsbee, and Tucker (2012) in their article entry in the journal of American business review on effects of unintended consequences, the effecting of HIPAA Act to regulate information security has a couple of ripples that were not intended in the… Initially the HIPAA was intended to ensure that limited cases of insurance fraud are reported, increase access to the health care, and guarantee administrative simplification.... However, with the implementation of the HIPAA Act, various problems have been witnessed as Information Sensitivity and Protection of Data: HIPAA Affiliation: Summary According to Jarrell, Welker, Silsbee, and Tucker (2012) in their article entry in the journal of American business review on effects of unintended consequences, the effecting of HIPAA Act to regulate information security has a couple of ripples that were not intended in the initial plan....
2 Pages (500 words) Essay

Scenario Neighbourhood Dispute

ithin your answer consider the implications of not responding appropriately, also discuss any relevant policy.... However, current guidelines and policies involve; Training for all security personnel on domestic violence and workplace violence, notifying the security department of any patient or employee who is a victim, notifying staff when security officers witness threats or abusive behavior toward patients and Coordinating with local law enforcement.... Q1 How would the police officer gain further information to assist them to establish the nature of response to the incident?...
1 Pages (250 words) Essay

Information Policy: Information Privacy and Security

Perhaps the need for Information Policy Information Privacy and Security information security and Privacy is of importance to me because it has augmented in the last few decades due to the explosion of IT.... My concern challenges the government to give valuable insights into the problem of managing information security instead of embracing a legislative approach.... Companies require assistance in creating information security platforms in their entire networks....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us