Information Security Legal and Regulatory Issues Flashcards
What is intellectual propery and how can it be protected?
- intangible assets created through intellectual efforts
- can be protected through:
- Patent
- Trademark
- Copyright
- Trade Secret
- Licensing
Describe Patent
- form of legal protection granted to inventors for their inventions or discoveries
- provides exclusive rights to the inventor for a limited period, typically 20 years from the date of filing, to prevent others from making, using, selling, or importing the patented invention without permission
Describe Trademark
- recognizable sign, symbol, design, word, phrase, logo or combination thereof that distinguishes goods or services of one business from those of others
- serves as an identifier of the source of the goods or services and helps build brand recognition and customer trust
Describe Copyright
- legal protection granted to authors, artists, musicians, and creators of original works
- automatically applies upon creation of an original work in a fixed tangible form, such as literature, music, software, paintings, photographs, or films
- duration of copyright protection varies depending on the country, but in general, it lasts for the lifetime of the author plus a certain number of years after their death
Describe Trade Secret
- confidential and valuable business information that is absolutely critical to the business, as it provides a competitive advantage to its owner
- can include formulas, recipes, manufacturing processes, customer lists, marketing strategies, or any other information that is not generally known or readily accessible to others
- unlike patents or trademarks, trade secrets are not publicly disclosed
Describe Licensing
- granting of rights to use, distribute, or modify software according to the terms outlined in a software license agreement
- define the terms of use, such as the number of installations, permitted usage, limitations, support provisions, and restrictions on copying or modification
What are the 4 types of licensing?
- Contractual License
- Shrink-Wrap License
- Click-Through License
- Cloud Services License
Describe Contractual License
- software licensing agreement that is negotiated and agreed upon through a formal contract between the software vendor and the user or organization
- the terms and conditions of the license, including usage rights, limitations, and fees, are outlined in the contract
- typically used for custom software solutions or specialized software tailored to specific business needs
Describe Shrink-Wrap License
- type of software license that is packaged with the software product and is presented to the user upon opening the shrink-wrapped package
- typically printed inside the package or included as a separate document
Describe Click-Through License
- type of software license agreement that is presented to the user during the installation or download process of the software
- user is required to read and accept the terms and conditions of the license agreement by clicking an “Accept” or “Agree” button before proceeding with the installation or use of the software
Describe Cloud Services License
- licensing models used for software or services delivered through cloud computing platforms
- typically outline the usage rights, data ownership, service level agreements (SLAs), and any restrictions or limitations on the use of the cloud services
What are Import and Export Controls?
regulations and measures imposed by governments to manage the cross-border movement of goods, services, technologies, and information
What is the Purpose of Import and Export Controls? (3)
- National Security
- Non-Proliferation
- Economic Interests
What might be the regulated items for import/export?
- physical goods, software, technologies, technical data, encryption devices, or cryptographic materials
- may also cover the transfer of services, such as consulting or technical assistance, related to controlled items
What are Dual-Use Technologies?
goods, software, or technologies that have both civilian and military applications
What is Wassenaar Arrangement?
international export control regime that focuses on the non-proliferation of conventional arms and dual-use goods and technologies
What does Wassenaar Arrangement cover?
covers a wide range of items, including firearms, military equipment, and certain dual-use goods and technologies that have both civilian and military applications
What is the impact of Wassenaar Arrangement on information security?
may require security professionals to be aware of and comply with export control regulations when dealing with certain software, encryption technologies, intrusion software, or other technologies that could have military or security implications
Data Privacy is protection of what?
- Personal Information (PI)
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
What is Personal Information (PI)?
- any information that can identify an individual, either directly or indirectly
- can be sensitive and must be protected to maintain individuals’ privacy and prevent unauthorized use or disclosure
What is the key distinction between Personal Information (PI) and Personally Identifiable Information (PII)?
- ambiguity and direct identification
- PII directly and unambiguously identifies an individual, whereas PI may require some additional effort, context, or data correlation to link the information to a specific person
What is Personally Identifiable Information (PII)?
- specifically refers to information that can be used to identify an individual
- protecting PII is crucial to prevent identity theft, fraud, and unauthorized access to individuals’ personal data
- subset of Personal Information
What is Protected Health Information (PHI)?
- individually identifiable health information that is created, received, stored, or transmitted by healthcare providers, health plans, or healthcare clearinghouses
- includes personal details related to an individual’s physical or mental health, healthcare services received, medical history
What is Right to be Forgotten?
- individual’s right to request the removal or deletion of their personal data from online platforms or search engine results
- individuals have the right to have their personal data erased, made inaccessible, or no longer linked to their identity when certain conditions are met