【CISSP】Chapter 4 Laws, Regulations, and Compliance

Exam Essentials

  1. Understand the differences between criminal law, civil law, and administrative law. Criminal law protects society against acts that violate the basic principles we believe in. Violations of criminal law are prosecuted by federal and state governments. Civil law provides the frame- work for the transaction of business between people and organizations. Violations of civil law are brought to the court and argued by the two affected parties. Administrative law is used by government agencies to effectively carry out their day-to-day business.

  2. Be able to explain the basic provisions of the major laws designed to protect society against computer crime. The Computer Fraud and Abuse Act (as amended) protects computers used by the government or in interstate commerce from a variety of abuses. The Electronic Commu- nications Privacy Act (ECPA) makes it a crime to invade the electronic privacy of an individual.

  3. Know the differences among copyrights, trademarks, patents, and trade secrets. Copyrights protect original works of authorship, such as books, articles, poems, and songs. Trademarks are names, slogans, and logos that identify a company, product, or service. Patents provide protec- tion to the creators of new inventions. Trade secret law protects the operating secrets of a firm.

  4. Be able to explain the basic provisions of the Digital Millennium Copyright Act of 1998. The Digital Millennium Copyright Act prohibits the circumvention of copy pro- tection mechanisms placed in digital media and limits the liability of internet service pro- viders for the activities of their users.

  5. Know the basic provisions of the Economic Espionage Act of 1996. The Economic Espionage Act provides penalties for individuals found guilty of the theft of trade secrets. Harsher pen- alties apply when the individual knows that the information will benefit a foreign government.

  6. Understand the various types of software license agreements. Contractual license agreements are written agreements between a software vendor and user. Shrink-wrap agreements are written on software packaging and take effect when a user opens the package. Click-through agreements are included in a package but require the user to accept the terms during the software installation process.

  7. Understand the notification requirements placed on organizations that experience a data breach. California’s SB 1386 implemented the first statewide requirement to notify indi- viduals of a breach of their personal information. All other states eventually followed suit with similar laws. Currently, federal law only requires the notification of individuals when a HIPAA-covered entity breaches their protected health information.

  8. Understand the major laws that govern privacy of personal information in the United States, the European Union, and Canada. The United States has a number of privacy laws that affect the government’s use of information as well as the use of information by specific indus- tries, such as financial services companies and healthcare organizations that handle sensitive information. The EU has a more comprehensive General Data Protection Regulation that gov- erns the use and exchange of personal information. In Canada, the Personal Information Pro- tection and Electronic Documents Act (PIPEDA) governs the use of personal information.

  9. Explain the importance of a well-rounded compliance program. Most organizations are subject to a wide variety of legal and regulatory requirements related to information security. Building a compliance program ensures that you become and remain compliant with these often overlapping requirements.

  10. Know how to incorporate security into the procurement and vendor governance process. The expanded use of cloud services by many organizations requires added attention to conducting reviews of information security controls during the vendor selection process and as part of ongoing vendor governance.

  11. Be able to determine compliance and other requirements for information protection. Cybersecurity professionals must be able to analyze a situation and determine what jurisdictions and laws apply. They must be able to identify relevant contractual, legal, regulatory, and industry standards and interpret them for their given situation.

  12. Know legal and regulatory issues and how they pertain to information security. Understand the concepts of cybercrime and data breaches and be able to apply them in your environment when incidents arise. Understand what licensing and intellectual property protections apply to your organization’s data and your obligations when encountering data belonging to other organizations. Understand the privacy and export control issues associated with transferring information across international borders.

Written Lab

  1. What are the two primary mechanisms that an organization may use to share information outside the European Union under the terms of GDPR?

  2. What are some common questions that organizations should ask when considering outsourcing information storage, processing, or transmission?

  3. What are some common steps that employers take to notify employees of system monitoring?

Review Questions

1. Brianna is working with a U.S. software firm that uses encryption in its products and plans to export their product outside of the United States. What federal government agency has the authority to regulate the export of encryption software?

A. NSA                      B. NIST                        C. BIS                     D. FTC

2. Wendy recently accepted a position as a senior cybersecurity administrator at a U.S. government agency and is concerned about the legal requirements affecting her new position. Which law governs information security operations at federal agencies?

  A. FISMA                 B. FERPA                   C. CFAA                 D. ECPA

3. What type of law does not require an act of Congress to implement at the federal level but rather is enacted by the executive branch in the form of regulations, policies, and procedures?

  A. Criminal law         B. Common law         C. Civil law            D. Administrative law

4. What U.S. state was the first to pass a comprehensive privacy law modeled after the require- ments of the European Union’s General Data Protection Regulation?

  A. California             B. New York                C. Vermont           D. Texas

5. Congress passed CALEA in 1994, requiring that what type of organizations cooperate with law enforcement investigations?

  A. Financial institutions                                         B. Communications carriers

  C. Healthcare organizations                                 D. Websites

6. What law protects the right of citizens to privacy by placing restrictions on the authority granted to government agencies to search private residences and facilities?

  A. Privacy Act                                                        B. Fourth Amendment

  C. Second Amendment                                         D. Gramm–Leach–Bliley Act

7. Matthew recently authored an innovative algorithm for solving a mathematical problem, and he wants to share it with the world. However, prior to publishing the software code in a technical journal, he wants to obtain some sort of intellectual property (IP) protection. Which type of protection is best suited to his needs?

  A. Copyright                 B. Trademark                 C. Patent                 D. Trade secret

8. Mary is the cofounder of Acme Widgets, a manufacturing firm. Together with her partner, Joe, she has developed a special oil that will dramatically improve the widget manufacturing process. To keep the formula secret, Mary and Joe plan to make large quantities of the oil by themselves in the plant after the other workers have left. They want to protect this formula for as long as possible. What type of intellectual property (IP) protection best suits their needs?

  A. Copyright                 B. Trademark                 C. Patent                 D. Trade secret

9. Richard recently developed a great name for a new product that he plans to begin using immediately. He spoke with his attorney and filed the appropriate application to protect his product name but has not yet received a response from the government regarding his application. He wants to begin using the name immediately. What symbol should he use next to the name to indicate its protected status?

A. ©                                B. ®                                C. TM                      D. †

10. Tom is an adviser to a federal government agency that collects personal information from constituents. He would like to facilitate a research relationship between that firm that involves the sharing of personal information with several universities. What law prevents government agencies from disclosing personal information that an individual supplies to the government under protected circumstances?

A. Privacy Act                                                                  B. Electronic Communications Privacy Act

C. Health Insurance Portability and Accountability Act    D. Gramm–Leach–Bliley Act

11. Renee’s organization is establishing a partnership with a firm located in France that will involve the exchange of personal information. Her partners in France want to ensure that the transfer will be compliant with the GDPR. What mechanism would be most appropriate?

A. Binding corporate rules                                 B. Privacy Shield

C. Privacy Lock                                                 D. Standard contractual clauses

12. The Children’s Online Privacy Protection Act (COPPA) was designed to protect the privacy of children using the internet. What is the minimum age a child must be before companies can collect personal identifying information from them without parental consent?

A. 13                         B. 14                         C. 15                         D. 16

13. Kevin is assessing his organization’s obligations under state data breach notification laws. Which one of the following pieces of information would generally not be covered by a data breach notification law when it appears in conjunction with a person’s name?

  A. Social Security number                         B. Driver’s license number

  C. Credit card number                               D. Student identification number

14 Roger is the CISO at a healthcare organization covered under HIPAA. He would like to enter into a partnership with a vendor who will manage some of the organization’s data. As part of the relationship, the vendor will have access to protected health information (PHI). Under what circumstances is this arrangement permissible under HIPAA?

  A. This is permissible if the service provider is certified by the Department of Health and Human Services.

  B. This is permissible if the service provider enters into a business associate agreement.

  C. This is permissible if the service provider is within the same state as Roger’s organization.

  D. This is not permissible under any circumstances.

15. Frances learned that a user in her organization recently signed up for a cloud service without the knowledge of her supervisor and is storing corporate information in that service. Which one of the following statements is correct?

  A. If the user did not sign a written contract, the organization has no obligation to the service provider.

  B. The user most likely agreed to a click-through license agreement binding the organization.

  C. The user’s actions likely violate federal law.

  D. The user’s actions likely violate state law.

16. Greg recently accepted a position as the cybersecurity compliance officer with a privately held bank. What law most directly impacts the manner in which his organization handles personal information?

A. HIPAA                         B. GLBA                         C. SOX                         D. FISMA

17. Ruth recently obtained a utility patent covering a new invention that she created. How long will she retain legal protection for her invention?

  A. 14 years from the application date            B. 14 years from the date the patent is granted

  C. 20 years from the application date            D. 20 years from the date the patent is granted

18. Ryan is reviewing the terms of a proposed vendor agreement between the financial institution where he works and a cloud service provider. Which one of the following items should represents the least concern to Ryan?

  A. What security audits does the vendor perform?

  B. What provisions are in place to protect the confidentiality, integrity, and availability of data?

  C. Is the vendor compliant with HIPAA?

  D. What encryption algorithms and key lengths are used?

19. Justin is a cybersecurity consultant working with a retailer on the design of their new point-of-sale (POS) system. What compliance obligation relates to the processing of credit card information that might take place through this system?

  A. SOX                         B. HIPAA                         C. PCI DSS                         D. FERPA

20. Leonard and Sheldon recently coauthored a paper describing a new superfluid vacuum theory. How long will the copyright on their paper last?

A. 70 years after publication                                 B. 70 years after completion of the first draft

C. 70 years after the death of the first author       D. 70 years after the death of the last author

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 2
    评论
评论 2
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

OPTEE

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值