Information security legislation - Essay Example

Only on StudentShare

Extract of sample
Information security legislation

Never the less, times have changed and the recent past has seen a lot of regulations and legislation which impacts information security. Some of these legislations are the European Data Protection Directive, Sarbanes-Oxley Act, and the Capital Adequacy Directive, just to mention but a few. In the event of these new compliance rules organization are being forced to resort a range of codes and standards to control their information systems. (Purtell, 2007)
Information security is an organization problem, and not a technologically one. With increasing spotlight on information security in legislation and the media all over the world, companies are being faced with a complex need to conform to privacy and security regulations and standards. This is making information security issues to be discussed in the boardrooms and many executives and directors becoming aware of their responsibility in ensuring information security in an organization. Information security is driven by;
The knowledge of issues and challenges being faced in information security currently has increased. Through, the government, the media, crimes, cyber attacks and proliferation of products that are vulnerable, information security has continued to receive more attention (Purtell, 2007)
Through successful attacks for example code red and Nimrod, companies are realizing that security technology product is not the overall solution to information security. Information security is an organization problem and technology is only but a small element in the organization. (Purtell, 2007)
Companies are facing complex needs and requirements to conform to numerous regulation/standards. Even those vertical organizations such as financial services organizations, complication to adhere to security measures brought about by different regulations, for example the US Gramm-Leach Biley Act, 1999 (GLBA), ...Show more


Presently, many financial services companies are realizing the need to expand the range of risk management and governance to incorporate information technology (IT). This realization is increasing in the wake of increasing theft occurrences and other information security…
Author : shaniamorar
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Information security legislation"
with a personal 20% discount.
Grab the best paper

Related Essays

Information Systems Security Incident
The CONOP is defined to control the information & financial loss, for business continuity, security policy review and security awareness programme. The CIRT organization structure is detailed; roles and responsibilities of the team members are defined. CIRT acts on information & security logs to anticipate security threats and to resolve the security incidents.
4 pages (1000 words) Essay
Information Security Master Essay
This thesis is structured in three parts each with sub-divisions. In part 1 (2.0 -- 2.9), we survey and review Information Technology Policies and Acts of Congress, Presidential Executive Orders on IT , Office of Management and Budget (OMB) Circulars on IT.
42 pages (10500 words) Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 pages (1000 words) Essay
Principles of Information Security
The author of the paper states that risk assessment is the combined process of risk analysis and risk evaluation. It is mentioned that traditionally there are three types of risk analysis techniques, among them: quantitative, qualitative and semi-quantitative. However, it should be noted that each method is good for some point and fails at some point.
10 pages (2500 words) Essay
U.S Customs and Border Patrol's Role in Information Security
Due to such a phenomenal development in computer interconnectivity along with such a major rise in the usage of the internet there have been great alterations in the manner the government, the country and the majority of the globe
5 pages (1250 words) Essay
It is therefore significant that security is assessed in different contexts. In their examination of the origins and development of security in medieval England Fischer et al (2008) indicate that throughout history the concept of security can be traced to
7 pages (1750 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email