computer laws - This site gives some of the laws governing computer laws both national and international | `Trusted Computing' Frequently Asked Questions (August 2003) - indepth discussion of trusted computing, the grusted computing group, Microsoft's Palladium (Next-Generation Secure Computing Base for Windows) project, and Intel's "fritz Chip" | |
Privacy Cognizant Information Systems - Article from ACM Special Interest Group on Security, Audit and Control (SIGSAC). | Center for Democracy and Technology - This website has links to several court cases, legislations, regulations, and policies all related to encryption. | No hiding place; Jan 23rd 2003 - The protection of privacy will be a huge problem for the internet society |
U.S. Hopes to Check Computers Globally - An interesting article about implementing a global computer surveillance system to monitor possible security threats. | Privacy and Security on your PC - This is the first part on the topic of "Privacy and Security on your PC." It discusses the different groups of people that might attack your data and how they can do it. | Is Media Player Spyware? - This article discusses the potential vulnerabilities of the Windows media player. It describes the caching of CD/DVD lists and its possible uses. This link also provides Microsoft's reactions to these claims.
|
California now requires notification of customers of security breaches - Effective July 1, 2003, companies must notify their customers living in California of computer security breaches that might have resulted in a customer's personal data being acquired by an unauthorized person. Unauthorized acquisition of encrypted data is excluded, although the strength of the encryption is not specified (ROT13, anyone?). Notification of customers may be delayed if it would affect the results of a criminal investigation, a provision which may have the effect of motivating companies to report security breaches in order to gain more time. | Security Improvement Modules | Information security Hotlist |
CERT | ISO Security Standard | ISO Privacy Laws |
All.net | Legal Issues, Ethical Issues, Privacy, and Security | Legal and Ethical Issues about Cracking |
electronic Privacy Issues | Red Tape & White Flags in Security Politics, Policy, Social, Ethical, and Legal Issues | Legal and Ethical Issues Related to Cryptography and Information Security |
The SURFING LAWYER | Security and Privacy Resources | Economics and Security Resource Page |
Legal-Internet Laws | The Internet Censorship | IEEE Security and Privacy |
Managing Risk in the Legal profession | Ethical, Legal and Social Issues | Leading Ethical Issues Concerning Communication and Privacy |
Applicable Policy, Legislation, etc.,Papers Available Online | Ethical Implications of Privacy in Electronic Mail | National Infrastructure Protection Centre |
Ethics and The Law | Legal Ethics Articles | The Internet: Privacy and Security Issues in a New Communication Infrastructure |
Understand Ethical, Legal, Socio-Political Issues Surrounding Information/Information Technology | Patron Privacy - Ethical, Legal, and Practical Considerations | Ethics, Professional and Social Issues in Software Engineering |
LEGAL ETHICAL CYBERLIBRARY | Bush plan to monitor Net raises stir | Software, Security, and Ethnicity |
Terrorists on the Net? Who Cares? | Hire a hacker, not a cracker - By Crystal I. Ferraro, Site Editor | Digital Signature Guidelines Tutorial from the American Bar Association Section of Science and Technology, Information Security Committee. |
Back to Information Assurance e-Library Index
Click here to return to Wayne's World's homepage: