Legal Issues in Information Security, Second Edition

Legal Issues in Information Security, Second Edition

Joanna Lyn Grama
ISBN-13: 978-1-2840-5474-3
550 pages
© 2015

Learn More
Request a Review Copy

  • Description
  • Applied Labs
  • Table of Contents
  • Course Objectives
  • Resources

Part of the Jones & Bartlett Learning Information Systems Security and Assurance Series

Revised and updated to address the many changes in this evolving field, the Second Edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.

New to the Second Edition

  • Includes discussions of amendments in several relevant federal and state laws and regulations since 2011
  • Reviews relevant court decisions that have come to light since the publication of the first edition
  • Includes numerous information security data breaches highlighting new vulnerabilities

Applicable Courses

Appropriate for courses within Information Security, Cybersecurity, & Information Assurance

This title is available with a lab manual that allows students to put their classroom skills to work through numerous laboratory exercises.

Lab #1: Creating an IT Infrastructure Asset List and Identifying Where Privacy Data Resides
Lab #2: Case Study on U.S. Veteran Affairs and Loss of Private Information
Lab #3: Case Study on PCI DSS Non-Compliance: CardSystems Solutions
Lab #4: Analyzing and Comparing GLBA and HIPAA
Lab #5: Case Study on Issues Related to Sharing Consumers’
Confidential Information
Lab #6: Identifying the Scope of Your State’s Data and Security Breach Notification Law
Lab #7: Case Study on Digital Millennium Copyright Act: Napster
Lab #8: Cyberstalking or Cyberbullying and Laws to Protect Individuals
Lab #9: Recommending IT Security Policies to Help Mitigate Risk
Lab #10: Case Study on Computer Forensics: Pharmaceutical Company
Part 1: Fundamental Concepts
Chapter 1: Information Security Overview
Chapter 2: Privacy Overview
Chapter 3: The American Legal System
Part 2: Laws Influencing Information Security
Chapter 4: Security and Privacy of Consumer Financial Information
Chapter 5: Security and Privacy of Information Belonging to Children and Educational Records
Chapter 6: Security and Privacy of Health Information
Chapter 7: Corporate Information Security and Privacy Regulation
Chapter 8: Federal Government Information Security and Privacy Regulation
Chapter 9: State Laws Protecting Citizen Information and Breach Notification Laws
Chapter 10: Intellectual Property Law
Chapter 11: The Role of Contracts
Chapter 12: Criminal Law and Tort Law Issues in Cyberspace
Part 3: Security and Privacy in Organizations
Chapter 13: Information Security Governance
Chapter 14: Risk Analysis, Incident Response, and Contingency Planning
Chapter 15: Computer Forensics and Investigations
  1. Recognize the legal aspects of the information security triad: availability, integrity, and confidentiality.
  2. Examine the concept of privacy and its legal protections.
  3. Identify the basic components of the American Legal System.
  4. Describe legal compliance laws addressing public and private institutions.
  5. Analyze intellectual property laws.
  6. Describe the role of contracts in online transactions and cyberspace.
  7. Identify cybercrime and tort law Issues in cyberspace.
  8. Examine the principles requiring governance of information within organizations.
  9. Identify risk analysis and incident response procedures.
  10. Explain the importance of forensics examination in legal proceedings.

Instructor Resources include:

  • PowerPoint Lectures
  • Instructor’s Guide
  • Test and Quiz Items
  • Sample Syllabus
  • Case Scenarios/Handouts
  • Handouts
  • Projects
  • Study Guide
  • Time on Task
  • Content Map