Legally "reasonable" security requirements: A 10-year FTC retrospective
نویسندگان
چکیده
Growth in electronic commerce has enabled businesses to reduce costs and expand markets by deploying information technology through new and existing business practices. However, government laws and regulations require businesses to employ reasonable security measures to thwart risks associated with this technology. Because many security vulnerabilities are only discovered after attacker exploitation, regulators update their interpretation of reasonable security to stay current with emerging threats. With a focus on determining what businesses must do to comply with these changing interpretations of the law, we conducted an empirical, multi-case study to discover and measure the meaning and evolution of “reasonable” security by examining 19 regulatory enforcement actions by the U.S. Federal Trade Commission (FTC) over a 10 year period. The results reveal trends in FTC enforcement actions that are institutionalizing security knowledge as evidenced by 39 security requirements that mitigate 110 legal security vulnerabilities.
منابع مشابه
Evaluation and improvement of internet voting schemes based on legally-founded security requirements
In recent years, several nations and private associations have introduced Internet voting as additional means to conduct elections. To date, a variety of voting schemes to conduct Internet-based elections have been constructed, both from the scientific community and industry. Because of its fundamental importance to democratic societies, Internet voting – as any other voting method – is bound t...
متن کاملLegal Compatibility as a Characteristic of Sociotechnical Systems - Goals and Standardized Requirements
Legal compatibility as a characteristic of sociotechnical systems aims at the greatest possible compliance with higher-order legal goals for minimizing social risks of technical systems and extends legality, which refers to the prevention of lawlessness. The paper analyzes the criteria for legal compatibility by reviewing specifications of legally compatible systems and shows goals and resultin...
متن کاملDenial of SSI applications because of excess resources.
To receive payments under the Supplemental Security Income (SSI) program, certain eligibility requirements must be met. One requirement places a limit on the value of “countable resources** of an individual or a couple. Resources are defined in the regulations as cash and any other personal property, as well as any real property, that an individual: -owns; -has the right, authority, or power to...
متن کاملPrivacy and verifiability in electronic voting
Privacy and verifiability refer to fundamental principles of democratic elections and therefore belong to the set of established security requirements which each electronic voting scheme is expected to meet. However, very different ideas and opinions about privacy and verifiability exist in the scientific community, which shows that both properties are not well understood yet. Moreover, althoug...
متن کاملرهن و وثیقه اسناد براتی در حقوق ایران و انگلیس
Commercial instruments, in particular meaning, or bills are one of the most important means for business parties to enter into transactions. Such instruments are considered as a certain form of property with a great variety of uses. For example, they can be used as a means to pay or to use as a guarantee or security. But a question has always been posed:” whether such instruments can be used ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 30 شماره
صفحات -
تاریخ انتشار 2011