Law & Ethics, Policies & Guidelines, and Security Awareness



Similar documents
Information Security Policy

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

PRINCIPLES AND PRACTICE OF INFORMATION SECURITY

[Company Name] HIPAA Security Awareness and Workforce Training Program Manual

Information Security Law: Control of Digital Assets.

Information Security Program

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Information Security: A Perspective for Higher Education

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

DATA SECURITY AGREEMENT. Addendum # to Contract #

Computer Forensics US-CERT

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

I. U.S. Government Privacy Laws

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN

In an age where so many businesses and systems are reliant on computer systems,

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Information Security and Electronic Communications Acceptable Use Policy (AUP)

plantemoran.com What School Personnel Administrators Need to know

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION

Legal Ethics in the Information Age: Unique Data Privacy Issues Faced by Law Firms. v , rev

Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.

by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy

Information Security Program Management Standard

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Legislative Language

Impact of Legal and Regulatory Compliance on Higher Education Information Security Management. Dan Han Virginia Commonwealth University

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Online Lead Generation: Data Security Best Practices

Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.

Security in Fax: Minimizing Breaches and Compliance Risks

Enterprise PrivaProtector 9.0

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

ISO Controls and Objectives

Building Trust and Confidence in Healthcare Information. How TrustNet Helps

Cyberprivacy and Cybersecurity for Health Data

Identity Theft Security and Compliance: Issues for Business

How To Protect Decd Information From Harm

Wright State University Information Security

INFORMATION TECHNOLOGY POLICY

Cloud Computing Contracts. October 11, 2012

what your business needs to do about the new HIPAA rules

CSR Breach Reporting Service Frequently Asked Questions

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Certified Red Flag Specialist (CRFS) Program Overview & Curriculum

SECTION-BY-SECTION ANALYSIS

Computer Forensics Preparation

HIPAA Security Rule Compliance

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA Toll Free: (877) IRON411

HIPAA: Privacy/Info Security

Standard: Information Security Incident Management

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Cybercrime: A Sketch of 18 U.S.C and Related Federal Criminal Laws

ELECTRONIC INFORMATION SECURITY A.R.

FINAL May Guideline on Security Systems for Safeguarding Customer Information

COMPUTER USE POLICY. 1.0 Purpose and Summary

SUMMARY OF POSITION ROLE/RESPONSIBILITIES:

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Riverside Community College District Policy No General Institution

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Information Security Plan May 24, 2011

White Paper on Financial Institution Vendor Management

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

INTERNATIONAL SOS. Data Protection Policy. Version 1.05

Securing Data on Portable Media.

UNIVERSITY PHYSICIANS OF BROOKLYN HIPAA BUSINESS ASSOCIATE AGREEMENT CONTRACT NO(S):

Data Management Policies. Sage ERP Online

Notice of Privacy Practices

Transcription:

Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1

Learning Objectives Upon completion of this material, you should be able to: Use this chapter as a guide for future reference on laws, regulations, and professional organizations Differentiate between laws and ethics Identify major national laws that relate to the practice of information security Understand the role of culture as it applies to ethics in information security Describe management s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines Principles of Information Security, 5th Edition 2

Introduction You must understand scope of an organization s legal and ethical responsibilities To minimize liabilities/reduce risks, the information security practitioner must: Understand current legal environment Stay current with laws and regulations Watch for new issues that emerge Read Ch. 3, 5 of the textbook Principles of Information Security, 5th Edition 3

Terminology (1) See also p. 89 of textbook Cultural mores: fixed morals or customs of a group of people, form basis of ethics Ethics: Rules that define socially acceptable behavior, not necessarily criminal, not enforced (via authority/courts) Laws: Rules that mandate or prohibit behavior, enforced by governing authority (courts) Laws carry sanctions of governing authority, ethics do not Policy: Organizational laws Body of expectations that defines acceptable workplace behavior General and broad, not aimed at specific technologies or procedures To be enforceable, policy must be distributed, readily available, easily understood, and acknowledged by employees Principles of Information Security, 5th Edition 4

Terminology (2) Standards, guidelines, best practices: define what must be done to comply with policy, how to do so Jurisdiction: a court s right to hear a case if a wrong was committed in its territory or against its citizens Long-arm jurisdiction: court s ability to reach far and apply law (another state, country) Case law: documentation about application of law in various cases Liability: legal obligation beyond what s required by law, increased if you fail to take due care Due care: has been taken when employees know what is/ isn t acceptable, what the consequences are Due diligence: sustained efforts to protect others Principles of Information Security, 5th Edition 5

Types of Law Civil: laws governing nation or state Criminal: harmful actions to society, prosecuted by the state Tort: individual lawsuits as recourse for wrongs, prosecuted by individual attorneys Private: includes family, commercial, labor law Public: includes criminal, administrative, constitutional law Principles of Information Security, 5th Edition 6

Law and Information Security In practice, you can be sued for almost anything; no absolute protection against litigation Information security practices can: Reduce likelihood that incidents result in lawsuits Reduce likelihood that you lose (by demonstrating due care and due diligence) Minimize damages/awards Help you respond effectively and efficiently to incidents We ll focus on criminal laws. Know Table 3-1 in the book; FERPA, HIPAA, DMCA. Principles of Information Security, 5th Edition 7

Relevant Federal Laws (General) Computer Fraud and Abuse Act of 1986 (CFAA) National Information Infrastructure Protection Act of 1996 USA PATRIOT Act of 2001 (made permanent in 2006) Broadens reach of law enforcement agencies Broadens protected information re. open records law Increased accountability, sanctions against money laundering National Security Letters: cannot be contested before a judge, permanent gag order Telecommunications Deregulation and Competition Act of 1996 Communications Decency Act of 1996 (CDA) (struck down) Computer Security Act of 1987: sets minimal federal government security standards Principles of Information Security, 5th Edition 8

Relevant Federal Laws (Privacy) Federal Privacy Act of 1974: Federal government Electronic Communications Privacy Act of 1986: Regulates interception of electronic communications Health Insurance Portability and Accountability Act of 1996 (HIPAA), Gramm-Leach-Bliley Act of 1999 (GLBA): Requires privacy policies in healthcare and financial industries, restricts sharing & use of customer info Family Education Rights and Privacy Act (FERPA): Restricts distribution of student academic records such as names and grades Freedom of Information Act of 1966: can request info from gov t, some info is protected FACTA Red Flag regulation of 2009 (ID theft) Principles of Information Security, 5th Edition 9

Relevant Federal Laws (Copyright) Intellectual property recognized as protected asset in the U.S.; copyright law extends to electronic formats With proper acknowledgement, permissible to include portions of others work as reference U.S. Copyright Office website: www.copyright.gov Digital Millennium Copyright Act of 1998 (DMCA): criminalizes circumvention of technological copyright protection measures (some exceptions) Principles of Information Security, 5th Edition 10

State and Local Regulations Restrictions on organizational computer technology use exist at international, national, state, local levels Information security professional responsible for understanding state regulations and ensuring organization is compliant with regulations State of Ohio: Ohio Rev. Code 1347: notify data breach victims Open records, anti-spam laws Principles of Information Security, 5th Edition 11

International Laws and Legal Bodies European Council Cyber-Crime Convention: Establishes international task force overseeing Internet security functions for standardized international technology laws Attempts to improve effectiveness of international investigations into breaches of technology law Well received by intellectual property rights advocates due to emphasis on copyright infringement prosecution Lacks realistic provisions for enforcement Principles of Information Security, 5th Edition 12

United Nations Charter Makes provisions, to a degree, for information security during information warfare (IW) IW involves use of information technology to conduct organized and lawful military operations IW is relatively new type of warfare, although military has been conducting electronic warfare operations for decades Principles of Information Security, 5th Edition 13

Ethics and Information Security Principles of Information Security, 5th Edition 14

Ethical Differences Across Cultures Cultural differences create difficulty in determining what is and is not ethical Difficulties arise when one nationality s ethical behavior conflicts with ethics of another national group Example: many ways in which Asian cultures use computer technology is software piracy Principles of Information Security, 5th Edition 15

Ethics and Education Overriding factor in leveling ethical perceptions within a small population is education Employees must be trained in expected behaviors of an ethical employee, especially in areas of information security Proper ethical training vital to creating informed, well prepared, and low-risk system user Principles of Information Security, 5th Edition 16

Association of Computing Machinery (ACM) ACM established in 1947 as the world's first educational and scientific computing society Code of ethics contains references to protecting information confidentiality, causing no harm, protecting others privacy, and respecting others intellectual property Principles of Information Security, 5th Edition 17

Computer Security Institute (CSI) Provides information and training to support computer, networking, and information security professionals Though without a code of ethics, has argued for adoption of ethical behavior among information security professionals Principles of Information Security, 5th Edition 18

Key U.S. Federal Agencies Department of Homeland Security (DHS) Federal Bureau of Investigation s National Infrastructure Protection Center (NIPC) National Security Agency (NSA) U.S. Secret Service Principles of Information Security, 5th Edition 19

Information Security Policy, Standards and Practices Communities of interest must consider policies as basis for all information security efforts Policies direct how issues should be addressed and technologies used Security policies are least expensive controls to execute but most difficult to implement Shaping policy is difficult Principles of Information Security, 5th Edition 20

OSU Policies and Standards Policies Responsible Use of University Computing & Network Resources Archives & Retention Merchant Services & Use of Credit Cards Deployment, Use of Wireless Data Networks Public Records Data Policy Personal Info Disclosure Standards University Computer Security Standards: Min. Computer Security Critical Server Security Web Server Security DB Server Security Local Administrative Privilege Standard See http://ocio.osu.edu for more details Principles of Information Security, 5th Edition 21

Principles of Information Security, 5th Edition 22

Policy Management Policies must be managed as they constantly change To remain viable, security policies must have: Individual responsible for reviews A schedule of reviews Method for making recommendations for reviews Specific policy issuance and revision date Principles of Information Security, 5th Edition 23

Information Classification Classification of information is an important aspect of policy, e.g., public, internal, classified Policies are classified A clean desk policy stipulates that at end of business day, classified information must be properly stored and secured In today s open office environments, may be beneficial to implement a clean desk policy Principles of Information Security, 5th Edition 24

Security Education, Training, and Awareness Program As soon as general security policy exist, policies to implement security education, training and awareness (SETA) program should follow SETA is a control measure designed to reduce accidental security breaches Security education and training builds on the general knowledge the employees must possess to do their jobs, familiarizing them with the way to do their jobs securely The SETA program consists of three elements: security education; security training; and security awareness Principles of Information Security, 5th Edition 25

Security Education Everyone in an organization needs to be trained and aware of information security; not every member needs formal degree or certificate in information security When formal education for individuals in security is needed, an employee can identify curriculum available from local institutions of higher learning or continuing education A number of universities have formal coursework in information security Principles of Information Security, 5th Edition 26

Security Training Involves providing members of organization with detailed information and hands-on instruction designed to prepare them to perform their duties securely Management of information security can develop customized in-house training or outsource the training program Principles of Information Security, 5th Edition 27

Figure 5-15 Spheres of Security Principles of Information Security, 5th Edition 28

Design of Security Architecture Defense in depth Implementation of security in layers Requires that organization establish sufficient security controls and safeguards so that an intruder faces multiple layers of controls Security perimeter Point at which an organization s security protection ends and outside world begins Does not apply to internal attacks from employee threats or on-site physical threats Principles of Information Security, 5th Edition 29

Key Technology Components Firewall: device that selectively discriminates against information flowing into or out of organization Demilitarized zone (DMZ): no-man s land between inside and outside networks where some organizations place Web servers Intrusion Detection Systems (IDSes): in effort to detect unauthorized activity within inner network, or on individual machines, organization may wish to implement an IDS Principles of Information Security, 5th Edition 30

Figure 5-18 Key Components Principles of Information Security, 5th Edition 31

Summary Laws: rules that mandate or prohibit certain behavior in society; drawn from ethics Ethics: define socially acceptable behaviors; based on cultural mores (fixed moral attitudes or customs of a particular group) Types of law: civil, criminal, tort law, private, public Management has essential role in development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines Principles of Information Security, 5th Edition 32