Site MapHelpFeedbackChapter Summary
Chapter Summary
(See related pages)

Export Restrictions on Encryption Methods

  • Export controls exist for most countries with respect to encryption technology.


  • In the U.S., restrictions on exporting encryption technology are managed through the Department of Commerce.


  • A wide range of international laws exist concerning importation/exportation of encryption technologies—laws that have practical significance on software firms trading overseas.


Digital Signatures

  • Digital Signatures are governed by a wide range of laws, from the U.S. E-Sign Act, to individual state laws governing commerce.


  • Digital signatures can have the same legal standing as normal handwritten signatures.


Digital Rights Management

  • The application of technology to protect intellectual property and copyrighted material is called digital rights management.


  • Digital rights management is much more than simple copy protection. It can have detailed control, including printing restrictions and length-of-possession restrictions.


  • The Digital Millenium Copyright Act (DMCA) covers a wide range of legal issues surrounding the protection of intellectual property rights in a digital age.


Privacy

  • The European Union is the unmistakable leader in data privacy and protection legislation.


  • California SB1386 governs responsibilities for entities to notify Californians whenever personal information is compromised.


  • Several federal acts, HIPAA, GLB, FERPA, and others cover industry-specific privacy regulation.


Computer Trespass and Cybercrime

  • In the U.S., computer trespass is governed under Federal and State laws for the majority of situations.


  • International regulation is spotty, with many countries having no laws at all governing this area of computer security.


Ethics

  • Ethical issues in corporate governance now influence security issues through the stricter management controls surrounding corporate financial data integrity under Sarbannes-Oxley.


  • Computer-related ethical issues are typically governed by high-level corporate policies that dictate acceptable employee behavior.









Security+ and BeyondOnline Learning Center

Home > Chapter 24 > Chapter Summary