StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information security legislation - Essay Example

Cite this document
Summary
Presently, many financial services companies are realizing the need to expand the range of risk management and governance to incorporate information technology (IT). This realization is increasing in the wake of increasing theft occurrences and other information security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Information security legislation
Read Text Preview

Extract of sample "Information security legislation"

Download file to see previous pages

Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security. Some of these legislations are the European Data Protection Directive, Sarbanes-Oxley Act, and the Capital Adequacy Directive, just to mention but a few. In the event of these new compliance rules organization are being forced to resort a range of codes and standards to control their information systems. (Purtell, 2007) Information security is an organization problem, and not a technologically one.

With increasing spotlight on information security in legislation and the media all over the world, companies are being faced with a complex need to conform to privacy and security regulations and standards. This is making information security issues to be discussed in the boardrooms and many executives and directors becoming aware of their responsibility in ensuring information security in an organization. Information security is driven by; The knowledge of issues and challenges being faced in information security currently has increased.

Through, the government, the media, crimes, cyber attacks and proliferation of products that are vulnerable, information security has continued to receive more attention (Purtell, 2007) Through successful attacks for example code red and Nimrod, companies are realizing that security technology product is not the overall solution to information security. Information security is an organization problem and technology is only but a small element in the organization. (Purtell, 2007) Companies are facing complex needs and requirements to conform to numerous regulation/standards.

Even those vertical organizations such as financial services organizations, complication to adhere to security measures brought about by different regulations, for example the US Gramm-Leach Biley Act, 1999 (GLBA),

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security legislation Essay Example | Topics and Well Written Essays - 4750 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1533252-information-security-legislation
(Information Security Legislation Essay Example | Topics and Well Written Essays - 4750 Words)
https://studentshare.org/miscellaneous/1533252-information-security-legislation.
“Information Security Legislation Essay Example | Topics and Well Written Essays - 4750 Words”, n.d. https://studentshare.org/miscellaneous/1533252-information-security-legislation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information security legislation

The Context of Legislative Decision Making

They are effective because only the legislation which has the unanimity of approval would be passed.... The interest groups or professional lobbyists act to influence the legislative process when they need to secure passing of Bill by influencing public officials through information dissemination and also to influence or mold the minds of the public officials for reaching decisions through debating.... The business circles felt that they needed persons who could supply them with information about political activities....
7 Pages (1750 words) Assignment

Elements of Security System

"The information security Program and How a Security Assessment Fits In.... New legislation affecting business processes might also require a security upgrade.... Some new legislation may decrease the level of protection that a firm faces from the new business environment.... These possibilities would require significant adjustments in the security strategy in order to fit within the new legislation (Kairab, pg.... This paper explains the reason and how security strategy as a key element might require being updated as a perfect way of addressing security risks associated with various business environment....
1 Pages (250 words) Coursework

Terrorist Legislation in the UK

Critics have continuously blamed terrorist legislation for endangering democracy through suspending other legal acts, hence allowing authoritarian governance.... Many critics refer to the human rights laws which are commonly violated when implementing terrorist legislation.... The effects of such incursions upon human rights remain prevalent among many societies which have adopted terrorist legislation.... The article recognizes all laws, including anti-terrorism legislation which has been criticized by human rights activists as depriving...
5 Pages (1250 words) Essay

Navigating the Legislative Process in Analysis Autism as a Mental Disorder

This paper discusses the navigating the Legislative process in analysis autism as a mental disorder.... It considers several steps and stages that a proposed bill or statute must pass before it is envisioned in the constitution as the law.... The effort of the paper advocates for a change in the state of Connecticut....
6 Pages (1500 words) Research Paper

Conflicts in the US Legislators' Work

The paper “Conflicts in the US Legislators' Work” is a complex attempt to explain the US national legislature's composition and goals.... The author explicates the Congress divided into two chambers by intent to avoid hasty passage of ill-considered laws and to check public passions.... hellip; The main task of the legislature to draft, study, deliberate on, and approve bills....
6 Pages (1500 words) Research Paper

The Key Areas of Risk and Compliance

… The paper “Developing information security Policy That Meets Legal and Financial Requirements, and Protects Customer Confidentiality” is a persuasive example of an essay on information technology.... Organizations are faced with various information security risks.... The paper “Developing information security Policy That Meets Legal and Financial Requirements, and Protects Customer Confidentiality” is a persuasive example of an essay on information technology....
6 Pages (1500 words) Essay

Privacy of Data at Web Server

This legislation forms the basis of storage and use of individual information in the institution any breach is punishable by law and can be legally addressed.... o abet the security issues that may arise in the process of collection, storage and use of this individual information, the state in conjunction with IT experts have drafted and enacted several legislations to enhance privacy of information and data.... he use of information technology and information systems to facilitate operations in many organizations has been the most common practice today....
12 Pages (3000 words) Assignment

No Safe Harbour for Personal Data

The paper discusses personal data based on two legislations: one in the US and the other in the European Union, addressing the concerns raised, consequences of one of the court case, and application of personal data legislation implementation requirements.... It is clear that the US cannot enforce any legislation because different regions have different legislations when it comes to personal data.... The information can be shared with the third party or transferred IntroductionTechnology continues to influence the human and business requirements....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us