0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Cybresecurity - Selected Legal Issues (Paperback): Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan Cybresecurity - Selected Legal Issues (Paperback)
Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan
R339 Discovery Miles 3 390 Ships in 10 - 15 working days

The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information among private sector and government entities. This report also discusses the degree to which federal law may preempt state law.

Congressional Investigations of the Department of Justice, 1920-2012 - History, Law, and Practice (Paperback): Todd Garvey,... Congressional Investigations of the Department of Justice, 1920-2012 - History, Law, and Practice (Paperback)
Todd Garvey, Alissa M. Dolan
R407 Discovery Miles 4 070 Ships in 10 - 15 working days

Legislative oversight is most commonly conducted through congressional budget, authorization, appropriations, confirmation, and investigative processes, and, in rare instances, through impeachment. But the adversarial, often confrontational, and sometimes high profile nature of congressional investigations sets it apart from the more routine, accommodative facets of the oversight process experienced in authorization, appropriations, or confirmation exercises. While all aspects of legislative oversight share the common goals of informing Congress so as to best accomplish its tasks of developing legislation, monitoring the implementation of public policy, and disclosing to the public how its government is performing, the inquisitorial process also sustains and vindicates Congress's role in our constitutional scheme of separated powers and checks and balances. The rich history of congressional investigations from the failed St. Clair expedition in 1792 through Teapot Dome, Watergate, Iran-Contra, Whitewater, and the current ongoing inquiries into Operation Fast and Furious, has established, in law and practice, the nature and contours of congressional prerogatives necessary to maintain the integrity of the legislative role in that constitutional scheme. A review of the historical experience pertinent to congressional access to information regarding the law enforcement activities of the Department of Justice indicates that the vast majority of requests for materials are resolved through political negotiation and accommodation, without the need for judicial resolution. Absent an executive privilege claim or a statute barring disclosure there appears to be no court precedent imposing a threshold burden on committees to demonstrate a "substantial reason to believe wrongdoing occurred" in order to obtain information. Instead, an inquiring committee need only show that the information sought is within the broad subject matter of its authorized jurisdiction, is in aid of a legitimate legislative function, and is pertinent to the area of concern. In the last 85 years, Congress has consistently sought and obtained access to information concerning prosecutorial misconduct by Department of Justice officials in closed cases; and access to pre-decisional deliberative prosecutorial memoranda-while often resisted by the Department-is usually released upon committee insistence as well. In contrast, the Department rarely releases-and committees rarely subpoena-material relevant to open criminal investigations. Typically, disputes are resolved without recourse to an executive privilege claim. Instead, negotiations produce various compromises: narrowing informational requests, delaying the release of information that could have prejudicial consequences on prosecutions, or redacting sensitive materials. However, when Presidents do claim executive privilege, courts have been reluctant to resolve the dispute. Indeed, litigation over the scope of executive privilege in direct relation to congressional oversight and investigations has been quite limited. In total, there have been four cases dealing with executive privilege in the context of information access disputes between Congress and the executive, and two of those resulted in decisions on the merits. The Supreme Court has never addressed executive privilege in the face of a congressional demand for information.

Cybersecurity - Selected Legal Issues (Paperback): Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan Cybersecurity - Selected Legal Issues (Paperback)
Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan
R361 Discovery Miles 3 610 Ships in 10 - 15 working days

The federal government's role in protecting U.S. citizens and critical infrastructure from cyberattacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information among private sector and government entities. This report also discusses the degree to which federal law may preempt state law. It has been argued that, in order to ensure the continuity of critical infrastructure and the larger economy, a regulatory framework for selected critical infrastructure should be created to require a minimum level of security from cyber threats. On the other hand, others have argued that such regulatory schemes would not improve cybersecurity while increasing the costs to businesses, expose businesses to additional liability if they fail to meet the imposed cybersecurity standards, and increase the risk that proprietary or confidential business information may be inappropriately disclosed. In order to protect federal information networks, the Department of Homeland Security (DHS), in conjunction with the National Security Agency (NSA), uses a network intrusion system that monitors all federal agency networks for potential attacks. Known as EINSTEIN, this system raises significant privacy implications-a concern acknowledged by DHS, interest groups, academia, and the general public. DHS has developed a set of procedures to address these concerns such as minimization of information collection, training and accountability requirements, and retention rules. Notwithstanding these steps, there are concerns that the program may implicate privacy interests protected under the Fourth Amendment. Although many have argued that there is a need for federal and state governments, and owners and operators of the nation's critical infrastructures, to share information on cyber vulnerabilities and threats, obstacles to information sharing may exist in current laws protecting electronic communications or in antitrust law. Private entities that share information may also be concerned that sharing or receiving such information may lead to increased civil liability, or that shared information may contain proprietary or confidential business information that may be used by competitors or government regulators for unauthorized purposes. Several bills in the 112th Congress would seek to improve the nation's cybersecurity, and may raise some or all of the legal issues mentioned above. For example, H.R. 3523 (Rogers (Mich.)-Ruppersberger) addresses information sharing between the intelligence community and the private sector. H.R. 3674 (Lungren) includes provisions regarding the protection of critical infrastructure, as well as information sharing. H.R. 4257 (Issa-Cummings) would require all federal agencies to continuously monitor their computer networks for malicious activity and would impose additional cybersecurity requirements on all federal agencies. S. 2102 (Feinstein) seeks to facilitate information sharing. S. 2105 (Lieberman) includes the information sharing provisions of S. 2102, as well as provisions relating to the protection of critical infrastructure and federal government networks. S. 2151 (McCain) and H.R. 4263 (Bono-Mack) also addresses information sharing among the private sector and between the private sector and the government. Many of these bills also include provisions specifically addressing the preemption of state laws.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hermione Granger Wizard Wand - In…
 (1)
R803 Discovery Miles 8 030
Snappy Tritan Bottle (1.2L)(Coral)
R209 R169 Discovery Miles 1 690
Goldair Oscillating Fan Heater
R459 R399 Discovery Miles 3 990
Harry Potter Wizard Wand - In…
 (3)
R800 Discovery Miles 8 000
Bostik Sew Simple (25ml)
R31 Discovery Miles 310
Dig & Discover: Ancient Egypt - Excavate…
Hinkler Pty Ltd Kit R263 Discovery Miles 2 630
Elecstor E27 7W Rechargeable LED Bulb…
R399 R349 Discovery Miles 3 490
Sony PULSE Explore Wireless Earbuds
R4,999 R4,749 Discovery Miles 47 490
Blood Brothers - To Battleground…
Deon Lamprecht Paperback R290 R195 Discovery Miles 1 950
Cadac Pizza Stone (33cm)
 (18)
R398 Discovery Miles 3 980

 

Partners