SlideShare a Scribd company logo
1 of 12
Key U.S. Laws of Interest
 to Information Security
       Professionals


      BY : -
      Shivani Gamit (Student@SCIT_2011-13)
• Act – Communications Act of 1934, updated
  by Telecommunications Deregulation and
  Competition Act of 1996
• Subject – Telecommunications
• Year – 1934 (amended 1996 and 2001)
• Description – Regulates interstate and foreign
  telecommunications
• Act – Computer Fraud and Abuse Act (also
  known as Fraud and Related Activity in
  Connection with Computers)
• Subject – Threats to computers
• Year – 1986 (amended 1994,1996 and 2001)
• Description – Defines and formalizes laws to
  counter threats from computer related acts
  and offenses
• Act – Computer Security Act
• Subject – Federal Agency of Information
  Security
• Year – 1987
• Description – Requires all federal computer
  systems that contain classified information to
  have surety plans in place, and requires
  periodic security training for all individuals
  who operate, design, or manage such systems
•   Act – Economic Espionage
•   Subject – Trade secrets
•   Year – 1996
•   Description – Designed to prevent abuse of
    information gained by an individual working in
    one company and employed by another
•   Act – Federal Privacy Act
•   Subject – Privacy
•   Year – 1974
•   Description – Governs federal agency use of
    personal information
• Act – Gramm-Leach-Bliley Act (GLB) or
  Financial Services Modernization Act
• Subject – Banking
• Year – 1999
• Description – Focuses on facilitating affiliation
  among banks, insurance, and securities firm; it
  has significant impact on the privacy of
  personal information used by these industries
• Act – Health Insurance Portability and
  Accountability Act (HIPAA)
• Subject – Health care privacy
• Year – 1996
• Description – Regulates collection, storage,
  and transmission of sensitive personal health
  care information
•   Act – Sarbanes-Oxley Act
•   Subject – Financial Reporting
•   Year – 2002
•   Description – Affects how public organizations
    and accounting firms deal with corporate
    governance, financial disclosure, and the
    practice of public accounting
• Act – Security and Freedom through
  Encryption Act
• Subject – Use and sale of software that uses
  or enables encryption
• Year – 1999
• Description – Clarifies use of encryption for
  people in the USA and permits all person in
  the U.S. to buy or sell any encryption product
  and states that the government cannot
  require the use of any kind of key escrow
  system for encryption product
• Act – USA PATRIOT Improvement and
  Reauthorization Act
• Subject – Terrorism
• Year – 2006
• Description – Made permanent 14 of the 16
  expanded powers of the department of
  Homeland Security and the FBI in investigating
  terrorist activity
Thank You

More Related Content

Similar to Laws of interest to security professionals

Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
DDMA
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations
Swarupa Rani Sahu
 

Similar to Laws of interest to security professionals (20)

Privacy And Surveillance
Privacy And SurveillancePrivacy And Surveillance
Privacy And Surveillance
 
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
Presentatie dma boston 2011: Welke impact heeft us privacyregulering op uw bu...
 
Information Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric VanderburgInformation Security Lesson 1 - Eric Vanderburg
Information Security Lesson 1 - Eric Vanderburg
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 
Lesson 2-Identify Theft
Lesson 2-Identify TheftLesson 2-Identify Theft
Lesson 2-Identify Theft
 
Chapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptxChapter 3 - Lesson 2.pptx
Chapter 3 - Lesson 2.pptx
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Lesson-13_IT-REPORT.pptx. Information technology
Lesson-13_IT-REPORT.pptx. Information technologyLesson-13_IT-REPORT.pptx. Information technology
Lesson-13_IT-REPORT.pptx. Information technology
 
The Laws Every Homeowner Should Know
The Laws Every Homeowner Should KnowThe Laws Every Homeowner Should Know
The Laws Every Homeowner Should Know
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Defend Trade Secrets Act of 2016: A Polsinelli Update Series
Defend Trade Secrets Act of 2016: A Polsinelli Update SeriesDefend Trade Secrets Act of 2016: A Polsinelli Update Series
Defend Trade Secrets Act of 2016: A Polsinelli Update Series
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Cybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protectionsCybersecurity & data privacy whistleblower incentives and protections
Cybersecurity & data privacy whistleblower incentives and protections
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Laws of interest to security professionals

  • 1. Key U.S. Laws of Interest to Information Security Professionals BY : - Shivani Gamit (Student@SCIT_2011-13)
  • 2. • Act – Communications Act of 1934, updated by Telecommunications Deregulation and Competition Act of 1996 • Subject – Telecommunications • Year – 1934 (amended 1996 and 2001) • Description – Regulates interstate and foreign telecommunications
  • 3. • Act – Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers) • Subject – Threats to computers • Year – 1986 (amended 1994,1996 and 2001) • Description – Defines and formalizes laws to counter threats from computer related acts and offenses
  • 4. • Act – Computer Security Act • Subject – Federal Agency of Information Security • Year – 1987 • Description – Requires all federal computer systems that contain classified information to have surety plans in place, and requires periodic security training for all individuals who operate, design, or manage such systems
  • 5. Act – Economic Espionage • Subject – Trade secrets • Year – 1996 • Description – Designed to prevent abuse of information gained by an individual working in one company and employed by another
  • 6. Act – Federal Privacy Act • Subject – Privacy • Year – 1974 • Description – Governs federal agency use of personal information
  • 7. • Act – Gramm-Leach-Bliley Act (GLB) or Financial Services Modernization Act • Subject – Banking • Year – 1999 • Description – Focuses on facilitating affiliation among banks, insurance, and securities firm; it has significant impact on the privacy of personal information used by these industries
  • 8. • Act – Health Insurance Portability and Accountability Act (HIPAA) • Subject – Health care privacy • Year – 1996 • Description – Regulates collection, storage, and transmission of sensitive personal health care information
  • 9. Act – Sarbanes-Oxley Act • Subject – Financial Reporting • Year – 2002 • Description – Affects how public organizations and accounting firms deal with corporate governance, financial disclosure, and the practice of public accounting
  • 10. • Act – Security and Freedom through Encryption Act • Subject – Use and sale of software that uses or enables encryption • Year – 1999 • Description – Clarifies use of encryption for people in the USA and permits all person in the U.S. to buy or sell any encryption product and states that the government cannot require the use of any kind of key escrow system for encryption product
  • 11. • Act – USA PATRIOT Improvement and Reauthorization Act • Subject – Terrorism • Year – 2006 • Description – Made permanent 14 of the 16 expanded powers of the department of Homeland Security and the FBI in investigating terrorist activity