Monday, June 10, 2019

Legal and Regulatory Considerations in IT Security Research Paper

Legal and Regulatory Considerations in IT Security - Research Paper ExampleIn the US, selective information laws used in one assure are not necessarily homogeneous to those used in an independent state. Correspondingly, data laws used in the US states are not exactly similar to those used in other nations like Britain or Canada. Technically, laws governing access and use of computerized selective information differ from one autonomous region to another. Succeeding sections of this typography contains a comparative analysis of data laws in Washington State, the EU, and Canada.Data privacy and encryption regulations in Washington State are covered under(a) chapter 19, section 255 of the states laws. In Washington, private parties are protected by law against access and misapplication of personal information by illegitimate parties. Washington laws define data and information as any software or hardware files, including but not limited to personal contact information, recognitio n and debit card information, plus any encrypted business or personal documents (Lindsey & Smith, 2012). In Washington, breach of security and unaccredited access to confidential data and information constitutes acts of crime. In addition, unauthorized disclosure of personal or business information is prohibited by laws. Data owners must be informed by data controllers of any intention to disclose information prior to the disclosure (Lindsey & Smith, 2012). Persons guilty of data crimes include anyone involved in the assisting, facilitating or abetting of unauthorized access and misappropriation of someone else information. Persons and companies found to violate these data laws are subject to remedial provisions and liabilities.One data law in Washington involves controlled misuse of unauthorized information. Unauthorized access to information, followed by subsequent viewing, circulation or sale of the information attracts economically reasonable compensations as damages. In Washin gton State, another law which seeks to minify data misappropriation asserts that any unauthorized access

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.