Book description
Part of the Jones & Bartlett Learning Information Systems Security and Assurance Series
http://www.issaseries.com
Revised and updated to address the many changes in this evolving field, the Second Edition of Legal Issues in Information Security (Textbook with Lab Manual) addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.
Instructor Materials for Legal Issues in Information Security include:
PowerPoint Lecture Slides
Instructor's Guide
Sample Course Syllabus
Quiz & Exam Questions
Case Scenarios/Handouts
New to the Second Edition:
• Includes discussions of amendments in several relevant federal and state laws and regulations since 2011
• Reviews relevant court decisions that have come to light since the publication of the first edition
• Includes numerous information security data breaches highlighting new vulnerabilities
Table of contents
- Cover
- Title Page
- Copyright
- Contents
- Dedication
- Preface
- Acknowledgments
- About the Author
-
Part One: Fundamental Concepts
-
Chapter 1 Information Security Overview
- Why Is Information Security an Issue?
- What Is Information Security?
- Basic Information Security Concepts
- What Are Common Information Security Concerns?
- Do Different Types of Information Require Different Types of Protection?
- What Are the Mechanisms that Ensure Information Security?
- Do Special Kinds of Data Require Special Kinds of Protection?
- Chapter Summary
- Key Concepts and Terms
- Chapter 1 Assessment
-
Chapter 2 Privacy Overview
- Why Is Privacy an Issue?
- What Is Privacy?
- How Is Privacy Different from Information Security?
- What Are the Sources of Privacy Law?
- What Are Threats to Personal Data Privacy in the Information Age?
- What Is Workplace Privacy?
- What Are General Principles for Privacy Protection in Information Systems?
- Chapter Summary
- Key Concepts and Terms
- Chapter 2 Assessment
- Endnotes
- Chapter 3 The American Legal System
-
Chapter 1 Information Security Overview
-
Part Two: Laws Influencing Information Security
-
Chapter 4 Security and Privacy of Consumer Financial Information
- Business Challenges Facing Financial Institutions
- The Different Types of Financial Institutions
- Consumer Financial Information
- Who Regulates Financial Institutions?
- The Federal Financial Institutions Examination Council (FFIEC)
- The Gramm-Leach-Bliley Act
- Federal Trade Commission Red Flags Rule
- Payment Card Industry Standards
- Case Studies and Examples
- Chapter Summary
- Key Concepts and Terms
- Chapter 4 ASSESSMENT
- Endnotes
- Chapter 5 Security and Privacy of Information Belonging to Children and in Educational Records
- Chapter 6 Security and Privacy of Health Information
-
Chapter 7 Corporate Information Security and Privacy Regulation
- The Enron Scandal and Securities-Law Reform
- Why Is Accurate Financial Reporting Important?
- The Sarbanes-Oxley Act of 2002
- Compliance and Security Controls
- SOX Influence in Other Types of Companies
- Corporate Privacy Issues
- Case Studies and Examples
- Chapter Summary
- Key Concepts and Terms
- Chapter 7 ASSESSMENT
- Endnotes
- Chapter 8 Federal Government Information Security and Privacy Regulations
- Chapter 9 State Laws Protecting Citizen Information and Breach Notification Laws
-
Chapter 10 Intellectual Property Law
- The Digital Wild West and the Importance of Intellectual Property Law
- Legal Ownership and the Importance of Protecting Intellectual Property
- Patents
- Trademarks
- Copyright
- Protecting Copyrights Online—The Digital Millennium Copyright Act (DMCA)
- Case Studies and Examples
- Chapter Summary
- Key Concepts and Terms
- Chapter 10 ASSESSMENT
- Endnotes
- Chapter 11 The Role of Contracts
- Chapter 12 Criminal Law and Tort Law Issues in Cyberspace
-
Chapter 4 Security and Privacy of Consumer Financial Information
-
Part Three: Security and Privacy in Organizations
- Chapter 13 Information Security Governance
- Chapter 14 Risk Analysis, Incident Response, and Contingency Planning
- Chapter 15 Computer Forensics and Investigations
- Appendix A: Answer Key
- Appendix B: Standard Acronyms
- Appendix C: Law and Case Citations
- Appendix D: The Constitution of the United States of America
- Glossary of Key Terms
- References
- Index
Product information
- Title: Legal Issues in Information Security, 2nd Edition
- Author(s):
- Release date: June 2014
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284054750
You might also like
book
Legal Issues in Information Security
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Legal Issues …
book
Legal and Privacy Issues in Information Security, 3rd Edition
Thoroughly revised and updated to address the many changes in this evolving field, the third edition …
book
Information Security Management, 2nd Edition
Information Security Management, Second Edition arms students with answers to the most critical questions about the …
book
Security Policies and Implementation Issues, 2nd Edition
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies …