0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


The Council Directive (Law) on Data Protection for the European Union (EU) of 1995 declares that each EU nation is to apply protections similar to those of the OECD Guidelines. The Economic and Protection of Proprietary Information Act of 1996 corresponds to industrial and corporate espionage and expands the definition of property to include proprietary economic information in order to ...


Intellectual property law consists of a number of categories designed to protect the intellectual property of the author. These categories include the following: The patent law protects inventions and processes, ornamental designs, and new varieties of plants. It provides the owner of the patent with the legal right to prevent others from using or reproducing the object covered by the patent ...


The senior management of an organization has the duty of protecting the organization from losses as a result of natural disasters, malicious code, compromise of proprietary information, damage to reputation, violation of the law, employee privacy suits, and stockholder suits. Senior management must adhere to the prudent man rule, which obligates them to perform their duties with the same diligence ...


Under the Internet Activities Board (IAB) Ethics and the Internet, outlined in RFC 1087, activity that is defined as objectionable and unethical… Purposely seeks to gain unauthorized access to the resources of the Internet Destroys the integrity of computer-based information Disrupts the intended use of the Internet Wastes resources such as people, capacity, and computers through such ...


The Coalition for Computer Ethics, which is embodied as the Computer Ethics Institute (CEI), concentrates on the interface of advances in information technologies, ethics, and corporate and public policy. The CEI acknowledges industrial, academic, and public policy organizations and is concerned with the ethical issues concerned with the advancement of information technologies in society. CEI has asserted the following ten ...


The United States Department of Health, Education, and Welfare has established a list of fair information practices that concentrates on the privacy of individually identifiable personal information, which declare: There must not be personal data record-keeping systems whose very existence is secret. There must be a way for a person to find out what information about them is in ...


The Organization for Economic Cooperation and Development (OECD) established the following guidelines for ethical computing: Collection Limitation Principle affirms that there should be limits on the gathering of personal data, and any such data should be obtained by lawful and justified means and, where appropriate, with the knowledge or consent of the data subject. Data Quality Principle affirms that personal ...


In order to impart proper computing behavior, ethics should be woven into an organizational policy and further refined into an organizational ethical computing policy. Many organizations have contended with the issue of ethical computing and have generated guidelines for ethical behavior. The (ISC)2 Code of Ethics mandates that a Certified Information Systems Security Professionals (CISSPs) shall: Conduct themselves in accordance ...


Privacy is the legal protection from unauthorized publication of the individual’s personally identifiable information (PII). This right to privacy is exemplified in the following basic principles: Notice – regarding collection, use and disclosure of PII Choice – to opt out or opt in regarding disclosure of PII to third parties Access – by consumers to their PII to ...


Organizations establish and disclose privacy policies outlining their approach to handling PII. These usually entail: Statement of the organization’s commitment to privacy. The type of information the organization would collect. This could include names, addresses, credit card numbers, phone numbers, etc. Retaining and using e-mail correspondence. Information gathered through cookies and Web server logs and how that information is used. ...