Enterprise Security: Legal Challenges and Possible Solutions
نویسنده
چکیده
To survive in the business, especially the online, world, an enterprise requires an effective security infrastructure. However, enterprises should bear in mind that there is often also a legal obligation to keep certain data or information secure, emanating from legislation such as intellectual property, data protection or trade secret legislation or from contract. A number of technological measures already exist to provide security in the online world, such as encryption, electronic signatures and privacy enhancing technologies. However, one often encounters a number of legal constraints to the use of these measures through, for example, restrictions on the export and use of cryptography, difficulties and doubts of the legal recognition of electronic signatures, and different national rules on certification services. If electronic commerce is to grow, there is need for more international co-operation as well as mutual recognition of, and more liberalisation of, such regulations.
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملCloud Computing for Cyber Physical Systems: Reliability and Security Challenges and Solutions
Contemporary cloud computing solutions that have proven beneficial in supporting the needs of enterprise applications do not readily carry over to supporting cyber physical system workflows. For example, existing cloud platforms do not yet provide the stringent assurances on multiple simultaneous quality of service (QoS) properties expected by CPS applications including timeliness, reliability ...
متن کاملBYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD
Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities. With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools...
متن کاملChallenges to Multi-Enterprise Integration the EECOMS Experience
The EECOMS Project is a multi-company and university joint effort to research and develop intelligent, dynamic technologies for integrating supplychain planning, scheduling, and execution and for enabling the evolution of such multi-enterprise integration solutions. In this paper, we describe several critical challenges to enterprise integration in the form of "lessons learned" by the Project i...
متن کامل‘Riding Furiously in All Directions’ – Implications of Uncoordinated Technical, Organisational and Legal Responses to Illegal or Inappropriate On-line Behaviours
The development of technical, organisational and legal responses to the challenges posed by illegal or inappropriate on-line behaviours is a growth industry. As the incidence of e-crime and computer misuse has increased, so has the demand for more effective defensive and offensive solutions. Noticeably, while responses have tended to focus on discrete sets of technical, organisational or legal ...
متن کامل