Skip to main content

Computer Security And The Law: What You Can Do To Protect Yourself

Working as a defense contractor, one knows the importance of security regulations and directives. However, do these regulations really protect our mission critical data? One would like to think so, but no the answer is; it is really up to the security administrative team and the individual staff to ensure the security of systems. This paper will briefly discuss two important security regulations/laws important to the defense department; the impact of the regulations to security systems; and what an organization can do to protect mission critical data. These regulations: . . The Computer Fraud and Abuse Act of 1986 (Public Law 99-474) Computer Security Act of 1987 (Public Law 100-35)

1430 (PDF, 1.78MB)

25 Jul 2004
ByKaren Poffenbergen
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.