Description
8 pages without the references page.
the instructions are in the attachment below, please read it carefully,
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Last Name1
Name:
Course:
Professor:
Date:
Legal, Ethical and Professional Issues in Information Systems
Cybercrime is continuously evolving with retailers being a primary target. Information
security is not just a responsibility for an organization or a job for computer geeks in data centers
but also for the customers. Cybersecurity is a concern for individuals, corporations, and
governments. With cloud adoption, for example, one has a potential step forward and opportunity
for transformation. However, such benefits are accompanied by increased cyber threats impacting
the efficient flow of information and operations. Over the years, the government has intervened in
data security in an organization by passing laws that protect information, especially personal
information. These laws are not optional and require that data be protected be a certain way. For
example, is a law applied to an organization; it must follow the law. As such, these rules are more
than just good business practices but have also been identified as business requirements. Besides,
ethics and professional standards in an organization also form part of information security in an
organization. This paper discusses the Legal, Ethical and Professional Issues in Information
Systems.
The United States Patriot Act (USPA) was passed as a response to the September 11
terrorist attack in 2001. The law grants federal officials with authority to track and intercept
communications for law enforcement and foreign intelligence gathering. Also, this law allows the
secretary of the Treasury Regulatory to prevent corruption in the US financial institutions from
Last Name2
laundering money (Justice.gov). The law begins with the aim of enhancing domestic security
against terrorism and provides that the U.S government should take the issue of cyber terrorism
seriously. Section 105 of the act order for the expansion of the country’s electronic crime task
force. The primary aim of such a development is to prevent, detect and investigate various forms
of electronic crimes including possible crime attacks against the critical national infrastructure and
financial payment systems. Section 214 of the act widens the scope of the information that is
retrieved through trap and trace devices and pen registers (Grama). Also, the act increases the
frequency of the government’s internet traffic monitoring requests.
The Gramm-Leach-Bliley Act (GLBA) is a law passed by congress in 1999. Also known
as the Modernization Act of 1999, this law has been used to make a huge transformation of
information security in the banking industry. The GLBA defines a financial institution as an
institution that engages in the transaction of financial activities such as lending, borrowing,
providing credit counseling and debt collection (Grama). Essentially, this law requires that
financial institutions protect customers’ personal financial information. According to the law, each
financial institution a responsibility to affirm and respect the privacy of its customers. The financial
institutions must provide privacy and security of nonpublic information of the customer such as
social security number, financial account numbers, credit card numbers, date of birth, name,
address, phone numbers and any other sensitive details of the financial transactions (Grama). The
law requires that any financial institution should follow the...