Legally "reasonable" security requirements: A 10-year FTC retrospective

نویسندگان

  • Travis D. Breaux
  • David L. Baumer
چکیده

Growth in electronic commerce has enabled businesses to reduce costs and expand markets by deploying information technology through new and existing business practices. However, government laws and regulations require businesses to employ reasonable security measures to thwart risks associated with this technology. Because many security vulnerabilities are only discovered after attacker exploitation, regulators update their interpretation of reasonable security to stay current with emerging threats. With a focus on determining what businesses must do to comply with these changing interpretations of the law, we conducted an empirical, multi-case study to discover and measure the meaning and evolution of “reasonable” security by examining 19 regulatory enforcement actions by the U.S. Federal Trade Commission (FTC) over a 10 year period. The results reveal trends in FTC enforcement actions that are institutionalizing security knowledge as evidenced by 39 security requirements that mitigate 110 legal security vulnerabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation and improvement of internet voting schemes based on legally-founded security requirements

In recent years, several nations and private associations have introduced Internet voting as additional means to conduct elections. To date, a variety of voting schemes to conduct Internet-based elections have been constructed, both from the scientific community and industry. Because of its fundamental importance to democratic societies, Internet voting – as any other voting method – is bound t...

متن کامل

Legal Compatibility as a Characteristic of Sociotechnical Systems - Goals and Standardized Requirements

Legal compatibility as a characteristic of sociotechnical systems aims at the greatest possible compliance with higher-order legal goals for minimizing social risks of technical systems and extends legality, which refers to the prevention of lawlessness. The paper analyzes the criteria for legal compatibility by reviewing specifications of legally compatible systems and shows goals and resultin...

متن کامل

Denial of SSI applications because of excess resources.

To receive payments under the Supplemental Security Income (SSI) program, certain eligibility requirements must be met. One requirement places a limit on the value of “countable resources** of an individual or a couple. Resources are defined in the regulations as cash and any other personal property, as well as any real property, that an individual: -owns; -has the right, authority, or power to...

متن کامل

Privacy and verifiability in electronic voting

Privacy and verifiability refer to fundamental principles of democratic elections and therefore belong to the set of established security requirements which each electronic voting scheme is expected to meet. However, very different ideas and opinions about privacy and verifiability exist in the scientific community, which shows that both properties are not well understood yet. Moreover, althoug...

متن کامل

رهن و وثیقه اسناد براتی در حقوق ایران و انگلیس

  Commercial instruments, in particular meaning, or bills are one of the most important means for business parties to enter into transactions. Such instruments are considered as a certain form of property with a great variety of uses. For example, they can be used as a means to pay or to use as a guarantee or security. But a question has always been posed:” whether such instruments can be used ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 30  شماره 

صفحات  -

تاریخ انتشار 2011