Principles of Information Security Chapter 3 Review

1297 words 6 pages
Chapter 3 Review 1. What is the difference between law and ethics?
The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2. What is civil law, and what does it accomplish?
A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organisational and entities and people. 3. What are the primary examples of public law?
Criminal, administrative and constitutional law.
…show more content…

Is it afforded the same protection in every country of the world? What laws currently protect it in the United States and Europe?
Intellectual property is recognised as a protected asset in the United States. The U.S Copyright laws extend this privilege to the published word, including electronic formats. Fair use of copyrighted materials includes their use to support news reporting, teaching, scholarship, and a number of other related activities, so long as the use if for educational or library purposes, not for profit, and is not excessive. As long as proper acknowledgement is provided to the original author of such works, including a proper description of the location of source materials(citation) and the work is not represented as one’s own, it is entirely permissible to include portions of someone else’s work as reference.

The laws that currently protect it in the United States and Europe are the; Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) and Digital Millennium Copyright Act (DMCA). 12. How does the Sarbanes-Oxley Act of 2002 affect information security managers?
Executives working in firms covered by this law will seek assurance on the reliability and quality of information systems from senior information technology managers. In turn, IT managers will likely ask information security managers to verify the confidentiality and integrity of those same information systems in a process in the industry as


  • National Security Outline
    40730 words | 163 pages
  • accounting theory
    2001 words | 9 pages
  • Accounting: Interest and Bond
    8256 words | 34 pages
  • Elements of the Law of Contract
    24205 words | 97 pages
  • Enron Case
    1903 words | 8 pages
  • Busn 379 Finance Entire Course – Devry
    5904 words | 24 pages
  • Mis Laudon 12th Ed Chapter 5 Answer
    7123 words | 29 pages
  • Common Themes of Edgar Allan Poe
    3175 words | 13 pages
  • Australian Personal Property Securities Laws
    3183 words | 13 pages
  • Thesis on Capital Structure
    26839 words | 108 pages