Computer “Law”
Edward A Celaya
September 5, 2012
Regis University
Abstract
In the world of Information Technology the one thing that is king above all others should be the security of the device or network a person is on because if they feel that they can’t trust the network or device it is more than likely not going to be used. And even with cultural and corporate interests abound it is clear that intellectual property needs to be protected in order to insure a safe and secure computer experience.
Introduction In the world of Information Technology the one thing that is king above all others should be the security of the device or network a person is on because if they feel that they can’t trust the network or device it is more than likely not going to be used. We live in a world that is consistently changing and so are the criminals, so therefore the justice system must change along with it to make sure it can counter anything that does arise. Also in this world beyond just the laws that are put into place there can be ethical boundaries that are also put into place that aren’t actually law but shouldn’t have to be because it should just be common knowledge.
Laws
Historically, the United States has been a leader in the development and implementation of information security legislation to prevent misuse and exploitation of information and information technology (PIS 1). This right here already goes to show that laws are based in the culture of the country someone is in and why laws can’t always cross borders like ethics can. But in the U.S. there are numerous amounts of laws that have been put into place in order to make sure that any person in America is safe and secure knowing that there are certain steps that have been put into place to protect them. The most important one that most remember and is affected by is HIPAA, this is a law that protections a person medical information from being shared with anyone
References: Whitman, M. E., & Mattord, H. J. (2012). Principles of Information Security (4th ed.). Boston, MA: Course Technology (Cengage Learning). ISBN13: 978-1-1111-3821-9 THOMSON, K-L. (2003) Integrating Information Security into Corporate Culture PORT ELIZABETH TECHNIKON Retrieved on September 5, 2012 from http://nmmu.ac.za/documents/theses/ThomsonKL.pdf Koltun, P. (2012) Computers and the Law Sangamon State University Springfield, Illinois. Retrieved on September 5, 2012 from http://delivery.acm.org/10.1145/810000/809591/p236-koltun.pdf?ip=207.93.211.50&acc=ACTIVE%20SERVICE&CFID=111929651&CFTOKEN=95709402&__acm__=1346893833_fc4e998f7206f3087f0aef85813bb483 (2012) Intellectual Property Law: Patents, Trademarks and Copyright AllLaw.com Retrieved. on September 5, 2012 from http://www.alllaw.com/topics/intellectual_property