0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • R500 - R1,000 (1)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Cybresecurity - Selected Legal Issues (Paperback): Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan Cybresecurity - Selected Legal Issues (Paperback)
Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan
R339 Discovery Miles 3 390 Ships in 10 - 15 working days

The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information among private sector and government entities. This report also discusses the degree to which federal law may preempt state law.

Privacy - An Overview of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (October 2012) (Paperback):... Privacy - An Overview of Federal Statutes Governing Wiretapping and Electronic Eavesdropping (October 2012) (Paperback)
Charles Doyle, Gina Stevens
R566 Discovery Miles 5 660 Ships in 10 - 15 working days

This report provides an overview of the Electronic Communications Privacy Act (ECPA) and the Foreign Intelligence Surveillance Act (FISA). ECPA consists of three parts. The first, often referred to as Title III, outlaws wiretapping and electronic eavesdropping, except as otherwise provided. The second, the Stored Communications Act, governs the privacy of, and government access to, the content of electronic communications and to related records. The third outlaws the use and installation of pen registers and of trap and trace devices, unless judicially approved for law enforcement or intelligence gathering purposes. FISA consists of seven parts. The first, reminiscent of Title III, authorizes electronic surveillance in foreign intelligence investigations. The second authorizes physical searches in foreign intelligence cases. The third permits the use and installation of pen registers and trap and trace devices in the context of a foreign intelligence investigation. The fourth affords intelligence officials access to business records and other tangible items. The fifth directs the Attorney General to report to Congress on the specifics of the exercise of FISA authority. The sixth, scheduled to expire on December 30, 2012, permits the acquisition of the communications of targeted overseas individuals and entities. The seventh creates a safe harbor from civil liability for those who assist or have assisted in the collection of information relating to the activities of foreign powers and their agents.

Cybersecurity - Selected Legal Issues (Paperback): Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan Cybersecurity - Selected Legal Issues (Paperback)
Gina Stevens, Kathleen Ann Ruane, Alissa M. Dolan
R361 Discovery Miles 3 610 Ships in 10 - 15 working days

The federal government's role in protecting U.S. citizens and critical infrastructure from cyberattacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks from cyber threats, and proposals to facilitate and encourage sharing of cyber threat information among private sector and government entities. This report also discusses the degree to which federal law may preempt state law. It has been argued that, in order to ensure the continuity of critical infrastructure and the larger economy, a regulatory framework for selected critical infrastructure should be created to require a minimum level of security from cyber threats. On the other hand, others have argued that such regulatory schemes would not improve cybersecurity while increasing the costs to businesses, expose businesses to additional liability if they fail to meet the imposed cybersecurity standards, and increase the risk that proprietary or confidential business information may be inappropriately disclosed. In order to protect federal information networks, the Department of Homeland Security (DHS), in conjunction with the National Security Agency (NSA), uses a network intrusion system that monitors all federal agency networks for potential attacks. Known as EINSTEIN, this system raises significant privacy implications-a concern acknowledged by DHS, interest groups, academia, and the general public. DHS has developed a set of procedures to address these concerns such as minimization of information collection, training and accountability requirements, and retention rules. Notwithstanding these steps, there are concerns that the program may implicate privacy interests protected under the Fourth Amendment. Although many have argued that there is a need for federal and state governments, and owners and operators of the nation's critical infrastructures, to share information on cyber vulnerabilities and threats, obstacles to information sharing may exist in current laws protecting electronic communications or in antitrust law. Private entities that share information may also be concerned that sharing or receiving such information may lead to increased civil liability, or that shared information may contain proprietary or confidential business information that may be used by competitors or government regulators for unauthorized purposes. Several bills in the 112th Congress would seek to improve the nation's cybersecurity, and may raise some or all of the legal issues mentioned above. For example, H.R. 3523 (Rogers (Mich.)-Ruppersberger) addresses information sharing between the intelligence community and the private sector. H.R. 3674 (Lungren) includes provisions regarding the protection of critical infrastructure, as well as information sharing. H.R. 4257 (Issa-Cummings) would require all federal agencies to continuously monitor their computer networks for malicious activity and would impose additional cybersecurity requirements on all federal agencies. S. 2102 (Feinstein) seeks to facilitate information sharing. S. 2105 (Lieberman) includes the information sharing provisions of S. 2102, as well as provisions relating to the protection of critical infrastructure and federal government networks. S. 2151 (McCain) and H.R. 4263 (Bono-Mack) also addresses information sharing among the private sector and between the private sector and the government. Many of these bills also include provisions specifically addressing the preemption of state laws.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Becoming a teacher
Sarah Gravett, Josef de Beer, … Paperback R634 R559 Discovery Miles 5 590
Storying a Reflexive Praxis for Pedagogy…
Ambika Gopal Raj, Sharon H. Ulanoff Hardcover R2,810 Discovery Miles 28 100
Edge Computing - Models, Technologies…
Javid Taheri, Shuiguang Deng Hardcover R4,003 R3,504 Discovery Miles 35 040
Teachers Discovering Computers…
Isabel Tarling, Glenda Gunter, … Paperback R892 R821 Discovery Miles 8 210
Imaginative Science Education - The…
Yannis Hadzigeorgiou Hardcover R3,461 Discovery Miles 34 610
Critical Voices in Science Education…
Jesse Bazzul, Christina Siry Hardcover R4,016 Discovery Miles 40 160
Critical Questions in STEM Education
Valarie L. Akerson, Gayle A. Buck Hardcover R3,533 Discovery Miles 35 330
Hackable - How to Do Application…
Ted Harrington Hardcover R615 Discovery Miles 6 150
Teaching Multiplication with Lesson…
Masami Isoda, Raimundo Olfos Hardcover R1,506 Discovery Miles 15 060
Research Anthology on Securing Medical…
Information R Management Association Hardcover R12,004 Discovery Miles 120 040

 

Partners