Monday, September 23, 2019

Legal and Regulatory Considerations in IT Security Research Paper

Legal and Regulatory Considerations in IT Security - Research Paper Example In the US, data laws used in one state are not necessarily similar to those used in an independent state. Correspondingly, data laws used in the US states are not exactly similar to those used in other nations like Britain or Canada. Technically, laws governing access and use of computerized information differ from one autonomous region to another. Succeeding sections of this paper contains a comparative analysis of data laws in Washington State, the EU, and Canada. Data privacy and encryption regulations in Washington State are covered under chapter 19, section 255 of the state’s laws. In Washington, private parties are protected by law against access and misappropriation of personal information by unauthorized parties. Washington laws define data and information as any software or hardware files, including but not limited to personal contact information, credit and debit card information, plus any encrypted business or personal documents (Lindsey & Smith, 2012). In Washington, breach of security and unauthorized access to confidential data and information constitutes acts of crime. In addition, unauthorized disclosure of personal or business information is prohibited by laws. Data owners must be informed by data controllers of any intention to disclose information prior to the disclosure (Lindsey & Smith, 2012). Persons guilty of data crimes include anyone involved in the assisting, facilitating or abetting of unauthorized access and m isappropriation of someone else information. Persons and companies found to violate these data laws are subject to remedial provisions and liabilities. One data law in Washington involves controlled misuse of unauthorized information. Unauthorized access to information, followed by subsequent viewing, circulation or sale of the information attracts economically reasonable compensations as damages. In Washington State, another law which seeks to minimize data misappropriation asserts that any unauthorized access

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.