Principles of Information Security Chapter 3 Review
The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2. What is civil law, and what does it accomplish?
A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organisational and entities and people. 3. What are the primary examples of public law?
Criminal, administrative and constitutional law. …show more content…
Is it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe?
Intellectual property is recognised as a protected asset in the United States. The U.S Copyright laws extend this privilege to the published word, including electronic formats. Fair use of copyrighted materials includes their use to support news reporting, teaching, scholarship, and a number of other related activities, so long as the use if for educational or library purposes, not for profit, and is not excessive. As long as proper acknowledgement is provided to the original author of such works, including a proper description of the location of source materials(citation) and the work is not represented as one’s own, it is entirely permissible to include portions of someone else’s work as reference.
The laws that currently protect it in the United States and Europe are the; Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) and Digital Millennium Copyright Act (DMCA). 12. How does the Sarbanes-Oxley Act of 2002 affect information security managers?
Executives working in firms covered by this law will seek assurance on the reliability and quality of information systems from senior information technology managers. In turn, IT managers will likely ask information security managers to verify the confidentiality and integrity of those same information systems in a process in the industry as