Information Security Legal and Regulatory Issues Flashcards
What is intellectual propery and how can it be protected?
- intangible assets created through intellectual efforts
- can be protected through:
- Patent
- Trademark
- Copyright
- Trade Secret
- Licensing
Describe Patent
- form of legal protection granted to inventors for their inventions or discoveries
- provides exclusive rights to the inventor for a limited period, typically 20 years from the date of filing, to prevent others from making, using, selling, or importing the patented invention without permission
Describe Trademark
- recognizable sign, symbol, design, word, phrase, logo or combination thereof that distinguishes goods or services of one business from those of others
- serves as an identifier of the source of the goods or services and helps build brand recognition and customer trust
Describe Copyright
- legal protection granted to authors, artists, musicians, and creators of original works
- automatically applies upon creation of an original work in a fixed tangible form, such as literature, music, software, paintings, photographs, or films
- duration of copyright protection varies depending on the country, but in general, it lasts for the lifetime of the author plus a certain number of years after their death
Describe Trade Secret
- confidential and valuable business information that is absolutely critical to the business, as it provides a competitive advantage to its owner
- can include formulas, recipes, manufacturing processes, customer lists, marketing strategies, or any other information that is not generally known or readily accessible to others
- unlike patents or trademarks, trade secrets are not publicly disclosed
Describe Licensing
- granting of rights to use, distribute, or modify software according to the terms outlined in a software license agreement
- define the terms of use, such as the number of installations, permitted usage, limitations, support provisions, and restrictions on copying or modification
What are the 4 types of licensing?
- Contractual License
- Shrink-Wrap License
- Click-Through License
- Cloud Services License
Describe Contractual License
- software licensing agreement that is negotiated and agreed upon through a formal contract between the software vendor and the user or organization
- the terms and conditions of the license, including usage rights, limitations, and fees, are outlined in the contract
- typically used for custom software solutions or specialized software tailored to specific business needs
Describe Shrink-Wrap License
- type of software license that is packaged with the software product and is presented to the user upon opening the shrink-wrapped package
- typically printed inside the package or included as a separate document
Describe Click-Through License
- type of software license agreement that is presented to the user during the installation or download process of the software
- user is required to read and accept the terms and conditions of the license agreement by clicking an “Accept” or “Agree” button before proceeding with the installation or use of the software
Describe Cloud Services License
- licensing models used for software or services delivered through cloud computing platforms
- typically outline the usage rights, data ownership, service level agreements (SLAs), and any restrictions or limitations on the use of the cloud services
What are Import and Export Controls?
regulations and measures imposed by governments to manage the cross-border movement of goods, services, technologies, and information
What is the Purpose of Import and Export Controls? (3)
- National Security
- Non-Proliferation
- Economic Interests
What might be the regulated items for import/export?
- physical goods, software, technologies, technical data, encryption devices, or cryptographic materials
- may also cover the transfer of services, such as consulting or technical assistance, related to controlled items
What are Dual-Use Technologies?
goods, software, or technologies that have both civilian and military applications
What is Wassenaar Arrangement?
international export control regime that focuses on the non-proliferation of conventional arms and dual-use goods and technologies
What does Wassenaar Arrangement cover?
covers a wide range of items, including firearms, military equipment, and certain dual-use goods and technologies that have both civilian and military applications
What is the impact of Wassenaar Arrangement on information security?
may require security professionals to be aware of and comply with export control regulations when dealing with certain software, encryption technologies, intrusion software, or other technologies that could have military or security implications
Data Privacy is protection of what?
- Personal Information (PI)
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
What is Personal Information (PI)?
- any information that can identify an individual, either directly or indirectly
- can be sensitive and must be protected to maintain individuals’ privacy and prevent unauthorized use or disclosure
What is the key distinction between Personal Information (PI) and Personally Identifiable Information (PII)?
- ambiguity and direct identification
- PII directly and unambiguously identifies an individual, whereas PI may require some additional effort, context, or data correlation to link the information to a specific person
What is Personally Identifiable Information (PII)?
- specifically refers to information that can be used to identify an individual
- protecting PII is crucial to prevent identity theft, fraud, and unauthorized access to individuals’ personal data
- subset of Personal Information
What is Protected Health Information (PHI)?
- individually identifiable health information that is created, received, stored, or transmitted by healthcare providers, health plans, or healthcare clearinghouses
- includes personal details related to an individual’s physical or mental health, healthcare services received, medical history
What is Right to be Forgotten?
- individual’s right to request the removal or deletion of their personal data from online platforms or search engine results
- individuals have the right to have their personal data erased, made inaccessible, or no longer linked to their identity when certain conditions are met
What is Transborder Data Flow?
- movement or transfer of personal data across national borders or jurisdictional boundaries
- data privacy laws and regulations often impose restrictions and requirements on such cross-border data transfers to ensure the protection and privacy of individuals’ personal information
Transborder Data Flow has legal constraints over where data can be what?
- processed
- stored
- accessed
What are the different typs of law?
- Criminal Law
- Common Law
- Civil (Statutory) Law
- Administrative Law
- Customary Law
- Religious Law
- Maritime Law
- Contract and Tort Law
What’s Criminal Law?
- contains prohibitions against acts such as murder, assault, robbery and arson
- crime against society as a whole
What’s Common Law?
- based on legal precedents, or decisions made by judges in previous cases
- originated in England and expanded through the British Empire and later to countries influenced by English legal traditions
What are the primary sources of common law?
- primary sources of common law are court decisions (case law) and legal customs
- judicial decisions are considered binding on future cases with similar facts or legal issues, creating a doctrine of stare decisis (to stand by things decided)
What is Civil (Statutory) Law?
- based on codified legal systems that rely on comprehensive written codes of law enacted by legislatures
- traces its roots back to ancient Rome and continental Europe
What is the role of courts in Civil Law?
- courts in civil law systems play a narrower role compared to common law systems
- they primarily interpret and apply legislation rather than establishing legal principles through case law
What is Customary Law?
also known as traditional or indigenous law, is a legal system based on customs, traditions, and practices of specific communities or groups
What’s Administrative Law?
- branch of law that governs the activities and operations of administrative agencies, regulatory bodies, and government departments
- establishes the legal framework for the functioning of administrative bodies and the relationship between these agencies and the public
What’s Maritime Law?
specialized branch of law that governs legal matters and activities related to navigation, shipping, maritime commerce, and marine affairs
What’s Contract Law?
- deals with agreements between parties that create legally enforceable obligations
- governs the creation, interpretation, performance, and breach of contracts
- provides remedies and legal recourse if one party fails to fulfill their contractual obligations
What’s Tort Law?
- deals with civil wrongs that cause harm or injury to individuals or their property
- unlike contract law, tort law does not require a pre-existing agreement between parties
- aims to compensate the injured party for the harm suffered and may also serve as a deterrent to prevent similar wrongful conduct in the future
What’s Copyright and the Digital Millennium Copyright Act?
covers literary, musical and dramatic works