CSE332 Lecture 20
CSE332 Lecture 20
INDUSTRY ETHICS
AND LEGAL ISSUES
• The key difference between law and ethics is that law carries the
sanction of a governing authority and ethics do not
Law and Ethics in Information Security
• Cybercrime Laws – Prevent hacking, fraud, and identity theft. (e.g., CFAA, UK Computer Misuse Act)
• Intellectual Property Laws – Protect software, trademarks, and copyrights. (e.g., Copyright Act, Patent Laws)
• Compliance and Regulatory Laws – Ensure businesses follow security standards. (e.g., ISO 27001, PCI DSS,
SOX)
• Surveillance and Privacy Laws – Balance national security with individual privacy. (e.g., FISA, ECPA, PRISM
regulations)
• Contract and Liability Laws – Govern security obligations in business agreements. (e.g., NDA, SLAs in
cybersecurity contracts)
Types of Ethics in Information Security
• Privacy Ethics – Ensures responsible handling of user data.
• Hacking Ethics – Differentiates ethical hacking (white-hat) from malicious hacking (black-hat).
• AI and Security Ethics – Manages bias, transparency, and accountability in security AI.
• Cybersecurity Professional Ethics – Guides IT professionals on ethical security practices. (e.g., ISC²
Code of Ethics)
Examples of Law and Ethics in Information Security
• Facebook-Cambridge Analytica Scandal (Privacy Ethics & Data Protection Laws Violation)
Advantages:
• Data Protection – Ensures confidentiality and prevents unauthorized access.
• Organizations face significant legal and ethical responsibilities regarding information security.
• Failure to comply with security laws and ethical standards can result in legal penalties, financial losses,
and reputational damage.
Organizational Liability in Information Security
• Non-Compliance with Regulations – Violating laws like GDPR, HIPAA, or PCI DSS can result in
heavy fines.
• Cybersecurity Negligence – Failure to implement security measures can lead to legal action.
• Insider Threats and Employee Misconduct – Misuse of company data by employees leading
to legal liability.
Need for Legal Counsel in Cybersecurity
• Manage Data Protection Policies – Develop legal policies for handling customer and employee data.
• Draft Contracts and Agreements – Ensure secure and legally binding terms in business deals.
• Risk Assessment and Mitigation – Identify potential legal risks and prevent liabilities.
Examples of Organizational Ethics and Liability in Information Security
• Wells Fargo Fake Accounts Scandal (Unethical Employee Behavior and Corporate Accountability)
2. Purpose
3. Enforcement
5. Flexibility
6. Scope
• Acceptable Use Policy (AUP) – Defines proper use of company systems and networks.
• Password Management Policy – Sets rules for creating and maintaining secure passwords.
• Data Backup and Recovery Policy – Outlines procedures for data protection and restoration.
• Bring Your Own Device (BYOD) Policy – Regulates the use of personal devices for work.
• Access Control Policy – Determines user roles and permissions for system access.
Laws in Information Security
• Health Insurance Portability and Accountability Act (HIPAA) – Ensures security of healthcare
information.
• Computer Fraud and Abuse Act (CFAA) – Criminalizes unauthorized computer access.
• Cybersecurity Information Sharing Act (CISA) – Encourages data sharing for cybersecurity.
• Digital Millennium Copyright Act (DMCA) – Protects digital content and intellectual property.
• California Consumer Privacy Act (CCPA) – Regulates data privacy rights for California residents.
Differences Between Policy and Law
Criteria Policy Law
Nature Internal organizational rule Government-enforced legal rule
Guides employees’ actions and Maintains societal order and
Objective
decisions justice
Authority Created by an organization Created by legislative bodies
Applies to all individuals and
Applicability Limited to a specific organization
entities
Can be updated internally as
Modification Requires a legal process to change
needed
Enforced by courts and legal
Enforcement Managed by HR or internal teams
agencies
Can result in warnings or
Consequences Can lead to fines, penalties, or jail
termination
Data privacy law (e.g., GDPR,
Example Company cybersecurity policy
HIPAA)