Académique Documents
Professionnel Documents
Culture Documents
MAIN TOPICS
Regulatory Issues Information Security Regulations in India Indian Government Initiatives Regulation in UK Regulation in USA Comparison Of Security Environment
MAIN TOPICS
Regulatory Issues Information Security Regulations in India Indian Government Initiatives Regulation in UK Regulation in USA Comparison Of Security Environment
will be liable for a penalty of up to rupees 10 million. Section 65: Tampering with Computer Source Code- Anyone who deliberately or purposely
Hides Destroys or Alters any computer source code or Induces someone else to do so
shall be punishable with imprisonment up to three years, or with fine, which may go up to two lakh rupees, or with both.
If a person commits hacking, he/she is liable to be punished with imprisonment up to three years, or with a fine, which may go up to two lakh rupees, or with both.
MAIN TOPICS
Regulatory Issues Information Security Regulations in India Indian Government Initiatives Regulation in UK Regulation in USA Comparison Of Security Environment
MAIN TOPICS
Regulatory Issues Information Security Regulations in India Indian Government Initiatives Regulation in UK Regulation in USA Comparison Of Security Environment
REGULATION IN UK
The relevant laws concerning Information Security: The Data Protection Act covers issues related to the collection, storage, processing and distribution of personal data. It empowers individuals to access their recorded personal information, challenge it if necessary, and claim compensation in certain circumstances. The Act places obligations on those who record and use personal data. Such entities must inform the Information Commissioner through a notification and follow sound and proper practices by applying the eight Data Protection Principles described in the appendix.
REGULATION IN UK
The Regulation of Investigatory Powers Act 2000 (RIPA) made interception of communications without the express or implied consent of both the sender and receiver of the communication an offence. The Privacy and Electronic Communications (EC Directive) Regulations 2003 aims to ensure the protection of fundamental rights and freedoms (in particular the right to privacy) with respect to the processing of personal data in the telecommunications sector. Other laws that indirectly help to ensure information security include the Computer Misuse Act 1990, the Anti-terrorism, Crime and Security Act 2001, and the Freedom of Information Act 2000.
MAIN TOPICS
Regulatory Issues Information Security Regulations in India Indian Government Initiatives Regulation in UK Regulation in USA Comparison Of Security Environment
REGULATION IN USA
A number of laws and regulations exist in the US to ensure data security and confidentiality. These laws have specific requirements for compliance and penalties in the case of noncompliance. The US has sector specific laws, and moreover, it has laws at both the federal and state levels for data security and customer privacy. The following are some of the important laws in the US, which are relevant to data protection: The Health Insurance Portability and Accountability Act (HIPAA) covers the healthcare sector. It provides a uniform level of protection for all health information related to an individual that is stored or transmitted electronically. The Right to Financial Privacy Act (RFPA) protects the confidentiality of personal financial records. The purpose of the RFPA is the following: It requires that customers be notified before the disclosure of their records to the government. It gives customers the authority of challenging the release of their records to the government. It requires government agencies to produce an audit trail documenting the disclosure of customer information to the government, as well as any interagency transfer of information.
REGULATION IN USA
The Gramm-Leach-Bliley Act (GLBA) covers the financial services sector. The Act has a privacy clause comprising two subtitles: Subtitle A focuses on the protection of non-public personal information. Subtitle B focuses on the protection of financial information regarding customers. The Act covers safeguards to Ensure the security and confidentiality of customer information Protect against anticipated threats or hazards to such records Protect against unauthorized access to or use of customer information, which could result in harm or inconvenience to the customer
REGULATION IN USA
There are a number of other laws that are indirectly related to information security: The Computer Fraud and Abuse Act intends to reduce the hacking of computer systems. The Electronic Communications Privacy Act (ECPA) sets out provisions for the access, use, disclosure, interception and privacy protection of electronic communications. Other relevant laws include: The Tax Privacy Laws, The Childrens Online Privacy Protection Act, The Government Information Security Reform Act, The Federal Information Security Management Act,
MAIN TOPICS
Regulatory Issues Information Security Regulations in India Indian Government Initiatives Regulation in UK Regulation in USA Comparison Of Security Environment
THANK YOU