CSE332 Lecture 20 LPU Official
CSE332 Lecture 20 LPU Official
• The key difference between law and ethics is that law carries the
sanction of a governing authority and ethics do not
Law and Ethics in Information Security
• Data Protection Laws – Regulate data collection, storage, and processing. (e.g., GDPR, CCPA, HIPAA)
• GDPR(General Data Protection Regulation) – European law that gives individuals control over their personal
data.
• CCPA (California Consumer Privacy Act) – Protects the privacy rights of consumers in California.
• HIPAA (Health Insurance Portability and Accountability Act) – Protects medical information in the U.S.
• Cybercrime Laws – Prevent hacking, fraud, and identity theft. (e.g., CFAA, UK Computer Misuse Act)
CFAA(Computer Fraud and Abuse Act) – U.S. law that criminalizes unauthorized access to computers
UK Computer Misuse Act – UK legislation targeting cyberattacks and unauthorized system access.
• Intellectual Property Laws – Protect software, trademarks, and copyrights. (e.g., Copyright Act, Patent Laws)
Types of Laws in Information Security
• Compliance and Regulatory Laws – Ensure businesses follow security standards. (e.g., ISO 27001, PCI DSS)
PCI DSS (Payment Card Industry Data Security Standard) – Ensures secure handling of credit card data.
• Surveillance and Privacy Laws – Balance national security with individual privacy. (e.g., FISA, ECPA)
FISA (Foreign Intelligence Surveillance Act), CPA (Electronic Communications Privacy Act)
• Contract and Liability Laws – Govern security obligations in business agreements. (e.g., NDA in cybersecurity
contracts)
Types of Ethics in Information Security
• Hacking Ethics – Differentiates ethical hacking (white-hat) from malicious hacking (black-hat).
• AI and Security Ethics – Manages bias, transparency, and accountability in security AI.
• Facebook-Cambridge Analytica Scandal (Privacy Ethics & Data Protection Laws Violation)
Advantages:
• Data Protection – Ensures confidentiality and prevents unauthorized access.
• Organizations are legally and ethically responsible for protecting the data they collect, store, and
process. This includes customer data, employee records, intellectual property, and any sensitive
business information.
• Failure to comply with security laws and ethical standards can result in legal penalties, financial losses,
and reputational damage.
Organizational Liability in Information Security
• Data Breaches – If a company fails to protect personal data (like customer or employee info)
• Non-Compliance with Regulations – Violating legal rules or laws can result in heavy fines.
• Cybersecurity Negligence – Failure to implement security measures can lead to legal action.
• Insider Threats and Employee Misconduct – Misuse of company data by employees leading
to legal liability.
Need for Legal Counsel in Cybersecurity
• Manage Data Protection Policies – Develop legal policies for handling customer and employee
data.
• Draft Contracts and Agreements – Ensure secure and legally binding terms in business deals.
• Risk Assessment and Mitigation – Identify potential legal risks and prevent liabilities.
Examples of Organizational Ethics and Liability in Information Security
• Wells Fargo Fake Accounts Scandal (Unethical Employee Behavior and Corporate Accountability)
• Policy – An internal rule or guideline created by an organization to guide employee behavior and decision-making.
• Law – An official rule created by the government that applies to everyone in a country or state.
2. Purpose
3. Enforcement
5. Flexibility
6. Scope
• Acceptable Use Policy (AUP) – Defines proper use of company systems and networks.
• Password Management Policy – Sets rules for creating and maintaining secure passwords.
• Data Backup and Recovery Policy – Outlines procedures for data protection and restoration.
• Access Control Policy – Determines user roles and permissions for system access.
Laws in Information Security
• Health Insurance Portability and Accountability Act (HIPAA) – Ensures security of healthcare
information.
• Computer Fraud and Abuse Act (CFAA) – Criminalizes unauthorized computer access.
• Cybersecurity Information Sharing Act (CISA) – Encourages data sharing for cybersecurity.
• Digital Millennium Copyright Act (DMCA) – Protects digital content and intellectual property.
• California Consumer Privacy Act (CCPA) – Regulates data privacy rights for California residents.
Differences Between Policy and Law
Criteria Policy Law
Nature Internal organizational rule Government-enforced legal rule
Guides employees’ actions and Maintains societal order and
Objective
decisions justice
Authority Created by an organization Created by legal bodies
Applies to all individuals and
Applicability Limited to a specific organization
entities
Can be updated internally as
Modification Requires a legal process to change
needed
Enforced by courts and legal
Enforcement Managed by HR or internal teams
agencies
Can result in warnings or
Consequences Can lead to fines, penalties, or jail
termination
Data privacy law (e.g., GDPR,
Example Company cybersecurity policy
HIPAA)