Sign In
Not register? Register Now!
Pages:
4 pages/≈1100 words
Sources:
4 Sources
Style:
APA
Subject:
Technology
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Politics & Legislation

Case Study Instructions:

"History informs our future." Let us start by knowing the history. The last page of Appendix C shows a nice picture of the development of technology and law.
White House. (2009) Appendix C: Growth of Modren Comunications Technoloyg in the United State and Development of Supporting LEgal and Regulatory Framework. Cyberspace Policy Review.
Next, read the following article which also contains a list of legislations and standards. Moreover, the article discusses why it is difficulty and ineffective to execute certain legislations.
Bono, Stephen; Rubin, Aviel; Stubblefield, Adam; Green, Matthew. (2006) Security Through Legality. Communications of the ACM, Jun2006, Vol. 49 Issue 6, p41-43. (TUI library).
An in-depth analysis of the difficulty in compliance can be found in the article below, where the author focuses on CAN-SPAM Act of 2003.
Grimes, Galen A. (2003) Compliance With the CAN-SPAM Act of 2003. Communications of the ACM, Feb2007, Vol. 50 Issue 2, p56-62. (TUI library).
The enforcement of a legislation and standard is also difficult. The following article uses the organizational context and emphasizes the need for development processes that facilitate enforcement.
Siponen, M. (2006). Information Security Standards Focus on the Existence of Process, Not Its Content. Communications of the ACM, Aug2006, Vol. 49 Issue 8, pp. 97-100. (TUI library).
Security legislations are not only made for organizations but also for individuals. On a personal level, it is also difficult to fully understand the implications of a legislation and we often times ignore the details. Read the following article to understand what risks you will be exposed to if you don't understand fully about a legislation.
Desautels, Edward, Software License Agreements: Ignore at Your Own Risk. US-Cert. http://www(dot)us-cert(dot)gov/reading_room/EULA.pdf.
Now I hope you have grasped the major concepts and understood what I want to come across regarding security legislations after following the background information. As mentioned in this module's homepage, politics is naturally involved in making a legislation and in its enforcement, even when the word "politics" does show up.
After you have "strategically" read the above materials, and, more importantly, thought about them critically and interconnectively, please compose a 4- to 6-page paper on the topic:
Why is it difficult to make security legislations and standards? And what factors need to be considered when making and enforcing security rules and regulations ?
You may think that you are not a lawmaker, hence you don't need to know how to make a legislation. But as a future security officer in the company, you have to come up with a list of rules and regulations that the organization's employees should follow. You will also be responsible for following and enforcing existing legal requirements. Look at the various laws across countries as you weave the international issues into your discussion.
In preparing your paper, you need to discuss the following issues, and support with arguments and evidences:
•What are the major legislations and standards in information security?
•Are these legislations and standards serving their purposes?
•How to enforce these legislations and standards? Is it easy? Why?
•How to make security rules and regulations? Who are involved? What factors need to be considered?
Assignment Expectations (50 points total)
Length: Minimum 4–6 pages excluding cover page and references (since a page is about 300 words, this is approximately 1,200–1,800 words).
Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.
Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.
Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.
Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.
Citing sources (3 points): Uses in-text citations and properly formats references in APA style.

Case Study Sample Content Preview:
Politics and Legislation
Insert Name
Subject
Date
Institution

Introduction
Information is beneficial, and having particular, important and correct facts makes a huge transformation to an organization’s competence. The availability of technologies makes it possible for information collection, sharing, exchange, selling and distribution. It is essential in ensuring information security so that it becomes a common process in the daily tasks in a company. The businesses need to describe the risks and vulnerabilities to their data resources and enabling privacy, reliability and availability (Gordon et al., 2006).
Information securities are activities designed to protect information and the system data (Gordon & Loeb, 2006). Information security protects not only information but also hardware, software, risk, physical security and human aspects. Information security is significant to the digital age. The security of information needs strengthening because there are many breaches that occur daily threatening the credibility of an organization.
Organizations need to secure its hardware and software by formulating and implementing security policies. The security policies are combining values, rules, methods, procedures and tools that protect the organization from threats (Tryfonas, 2001). Establishing standards like BS7799, ISO I7799 are a beginning point for allowing information security policy to improve its information security in a company.
Security legislation and standards
Information security plans offer important support to security experts as they attempt to decrease the threat of an organization and keeps off risks that are internal and external. Some companies take time to develop policies that are custom made rather than download from the internet.
Security management in an organization use standards of information security management. The basis of success of managing security actions depends on the standards BS7799 and the current version BS ISO/IEC17799 (Eloff and Solms, 2000). Consultants and researchers support the extensive use of information security management standards. These standards have limitations. A standard emphasizes on particular information security procedures, but fails in giving instructions method of achieving the practices of security.
The standards of information security management are mainly concerned with safeguarding the presence of procedures rather than the processes of the content. The processes denote to a set of values through which make systems secure. Analysis of risks and creating an awareness plan are values of the security process (Bono et al., 2009). The overlooking of the contents in procedure shows in the way standards is concerned with ensuring that an action of information security exists in a company and does not provide a guide on how this is achievable. The procedures and guide and the values of security standards are simple and advice to attain them practicality.
The absence of content comes from the fact that the security methods does not mention about the quality of the procedure (Siponen, 2006). An organization that has implemented security standards, it does not mean it is achieving the main goals. The security plan of that or...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Case Study Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!