Information Security Requirements Legislation

Information Security Requirements Legislation in United States

Information Security Requirements Legislation

Overview of Information Security Requirements Legislation in relation to cyber crime: [1] The Information Technology Management Reform Act of 1996 requires that federal government agencies establish a chief information officer (CIO). A person holding this position is responsible for ensuring that information systems are properly managed and secure from threats of cybercrime. ”This law also requires the Secretary of Commerce to create standards and guidelines to improve efficiency of computer operations, security and privacy of federal computer systems, and made the Office of Management and Budgeting (OMB) responsible for overall federal IT procurement, investment and security” (McQuade, 2006, p. 322).

More Details about Information Security Requirements Legislation

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) established new health insurance protections for millions of working Americans and their family members, including people who have pre-employment medical conditions that could cause discrimination against them in hiring decisions. For example, if a person changes jobs, HIPAA helps to ensure that their previous health care and health insurance information, including that stored on information systems, is protected against cybercrime and not unlawfully shared in violation of applicable privacy rules.

Resources

Notes and References

  1. By Samuel C. McQuade, III

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Shostack, A., & Stewart, A. (2008). The new school of information security. Indianapolis, IN: Addison-Wesley Professional; Stamp, M. (2005). Information security: Principles and practice. New York: Wiley-Interscience; Whitman, M., & Mattford, H.J. (2007). Management of information security (2nd ed.). Florence, KY: Course Technology; Whitman, M., & Mattford, H.J. (2007). Principles of information security (3rd ed.). Florence, KY: Course Technology.


Posted

in

,

by