- Applied Labs
- Table of Contents
- Course Objectives
Part of the Jones & Bartlett Learning Information Systems Security and Assurance Series
Revised and updated to address the many changes in this evolving field, the Second Edition of Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.
New to the Second Edition
- Includes discussions of amendments in several relevant federal and state laws and regulations since 2011
- Reviews relevant court decisions that have come to light since the publication of the first edition
- Includes numerous information security data breaches highlighting new vulnerabilities
Appropriate for courses within Information Security, Cybersecurity, & Information Assurance
This title is available with a lab manual that allows students to put their classroom skills to work through numerous laboratory exercises.
|Lab #1:||Creating an IT Infrastructure Asset List and Identifying Where Privacy Data Resides|
|Lab #2:||Case Study on U.S. Veteran Affairs and Loss of Private Information|
|Lab #3:||Case Study on PCI DSS Non-Compliance: CardSystems Solutions|
|Lab #4:||Analyzing and Comparing GLBA and HIPAA|
Case Study on Issues Related to Sharing Consumers’
|Lab #6:||Identifying the Scope of Your State’s Data and Security Breach Notification Law|
|Lab #7:||Case Study on Digital Millennium Copyright Act: Napster|
|Lab #8:||Cyberstalking or Cyberbullying and Laws to Protect Individuals|
|Lab #9:||Recommending IT Security Policies to Help Mitigate Risk|
|Lab #10:||Case Study on Computer Forensics: Pharmaceutical Company|
|Part 1: Fundamental Concepts|
|Chapter 1:||Information Security Overview|
|Chapter 2:||Privacy Overview|
|Chapter 3:||The American Legal System|
|Part 2: Laws Influencing Information Security|
|Chapter 4:||Security and Privacy of Consumer Financial Information|
|Chapter 5:||Security and Privacy of Information Belonging to Children and Educational Records|
|Chapter 6:||Security and Privacy of Health Information|
|Chapter 7:||Corporate Information Security and Privacy Regulation|
|Chapter 8:||Federal Government Information Security and Privacy Regulation|
|Chapter 9:||State Laws Protecting Citizen Information and Breach Notification Laws|
|Chapter 10:||Intellectual Property Law|
|Chapter 11:||The Role of Contracts|
|Chapter 12:||Criminal Law and Tort Law Issues in Cyberspace|
|Part 3: Security and Privacy in Organizations|
|Chapter 13:||Information Security Governance|
|Chapter 14:||Risk Analysis, Incident Response, and Contingency Planning|
|Chapter 15:||Computer Forensics and Investigations|
- Recognize the legal aspects of the information security triad: availability, integrity, and confidentiality.
- Examine the concept of privacy and its legal protections.
- Identify the basic components of the American Legal System.
- Describe legal compliance laws addressing public and private institutions.
- Analyze intellectual property laws.
- Describe the role of contracts in online transactions and cyberspace.
- Identify cybercrime and tort law Issues in cyberspace.
- Examine the principles requiring governance of information within organizations.
- Identify risk analysis and incident response procedures.
- Explain the importance of forensics examination in legal proceedings.
Instructor Resources include: