1.5 Understanding Legal and Regulatory Issues Pertaining to Security Flashcards
Name What Makes an Asset Unnattratice to Potential Attackers.
Not Worthwhile | Too time-consuming | Too expensive
What are Some Questions and Organization Needs to Ask Themselves Regarding Data Security?
How is/Are our Information/Assets Protected? | What issues are pertaining to information security for our organization on a Global context? | What does the current threat landscape look like?
Who can the Security Function Interact With to Best Understand Legal and Regulatory Issues at a Global Context?
Compliance and Legal Functions
What do Trade Secrets Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?
Business Information | No | Potentially Infinite |Misappropriation
Example: Coca-Cola Recipe
What are the Goals of Intellectual Property Laws?
Simply, to encourage the creation of intellectual goods, such as inventions and artistic works, designs, and symbols, and to protect them.
What do Patents Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?
Functional Innovations and Novel ideas/inventions | Yes | Set period of time | Making, Using, or selling an invention
Example: Coca-Cola Bottling Machine
What do Copyrights Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?
Expression of an Idea emobided in a fixed medium, such as song, movies, and books | Yes | Set period of time | Copying or substantially similar work
Example: Coca-Cola Jingle
What do Trademarks Protect? Is Disclosure Required in a Breach? How long is the Asset Protected? What does it Protect Against?
Color, Sound, Symbols, Etc. Are used to distinguish one product from another | Yes | Potentially Infinite | Creating Confusion
Example: Coca-Cola Logo
What are Import/Export Controls?
Country-Based rules and laws implemented to manage which products, technologies, and information can move in and out of the countries.
What is the purpose of Import/Export controls?
Protect National Security, Inidividual Privacy, and economic well-being.
What is the Wassenaar Arrangement and how does Encryption fit in?
Used to specify Imports/Exports on ‘dual-use’ technology. Meaning, technology used by civilians and the military. | Used to manage the risk encryption poses, while facilitating trade. Allows certain countries to exchange and use cryptography systems of any strength, while preventing the acquisition of these items by terrorists.
What is the International Traffic and Arms Regulations (ITAR)
Created by the US to ensure control over any export of items such as missles, rockets, and bombs as well as anything else on the United States Munitions LIst (USML)
What US agency is responsible for overseeing the International Traffic and Arms Regulations (ITAR)?
Department of Defense, Directorate of Defense Trade Controls (DDTC)
What is the Export Administration Regulations (EAR)? Who is responsible?
Focuses on commerically available items such as computers, lasers, and marine items. As well as items that are for commercial use, but available to the military. | Overseen by the US Department of Commence, Bureau of Industry and Security (BIS).
What is the purpose of Transborder Data Flow, Data residency, and Data Localisation Laws?
To require specific data remain within a countries physical borders. Addresses challenges with sharing data across international borders.
What data is primarily associated with Transborder Laws and who is Accountable?
Primarily, personal data. The purpose is to protect individuals personal state, local, and regional data. The organization owning the data is accountable for customers’ personal data.
When Might an Organization Consider Transborder Data Laws?
When sharing information with providers in third-party countries that may have weaker laws. This includes sharing data with cloud providers hosting in neighboring countries.
How does the General Data Protection Regulation (GDPR), enacted in 2018, address customer data security in terms of transborder data sharing scenarios?
GDPR is a data localization policy that states European Customer Data be stored and processed only within the physical borders of the European Union.
After Consulting with the Legal Function, who is in Charge of Ensuring Data is Protected in Accordance with International Data Laws?
The Security Function is responsible for applying appropriate controls that meet regional data protection standards.
What is the Definition of Privacy?
Privacy is the State or Condition of being free from being observed or disturbed by other people.
Who all is Affected when Customer’s Personally Identifiable Information (PII) is Disclosed?
Both the user of the exposed data and the organization responsible for protecting that data.
How are Organizations Affected by Irresponsible PII Disclosure?
Risk of Liability, Fines, Reputational Loss, and a combination thereof.
What Type of Data is Considered ‘Personal Data’?
Any combination of data that can be used to identify an inidivudal.
Name the 4 Types of Personal Data that, when combined with Intellectual Property, Make up Sensitive Data.
Personal Information (PI) | Personally Identifiable Information (PII) | Personal Health Information (PHI) | Sensitive Personal Information (SPI)