Part 17 – Threats to Cloud Computing

FacebookTwitterLinkedInEmail
Description
In the final video of this module we have a look at the specific type of laws dealing with technology:
  • Export restrictions - the WASSENAAR Agreement made it illegal to export munitions to terrorists, but this also includes certain types of cryptography.
  • Trans-border issues - laws vary by territorial jurisdiction.
  • Privacy issues and employee monitoring - employees expect privacy, but they don't have a right to it in a business setting, however, it's important to be transparent about what can be monitored in order to be legally compliant.
  • Deter and protect assets - the goal is to prevent compromise, not to catch employees in the act!
  • HIPAA - applies to health insurers, providers, and clearing houses (claims processors). Organizations are still responsible even when outsourcing work covered under HIPAA.
  • Gram-Leach-Bliley Fanancial Services Modernization Act (GLBA) - customer info (PII) must be protected by financial institutions such as banks.
  • PCI DSS - credit card companies and related industries are self-regulated and must adhere to proper auditing and compliance standards. Failure to do so can result in their privileges being revoked.
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel