Sample Essay on:
POLITICS AND LEGISLATION IN INFORMATION SECURITY MANAGEMENT

Here is the synopsis of our sample research paper on POLITICS AND LEGISLATION IN INFORMATION SECURITY MANAGEMENT. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3-page paper examines legislation that has been directed toward information security protection. Bibliography lists 3 sources.

Page Count:

3 pages (~225 words per page)

File: D0_MTpolinfse.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

into a banks system and has made off with a ton of credit card information. Or maybe a devious programmer has initiated a destructive code that will confound computers when released. Or an author sues a group of readers for allegedly "stealing" her e-book and then distributing it without collecting royalties. The difficulty with legislating information is that information isnt necessarily tangible. Another difficulty is that information tends to skirt the First Amendments "Freedom of Speech" provision. If legislation is written too specifically, it can curtail peoples rights to access information. Written too broadly, and the law has about a million loopholes that people can use to take information. For example, the Digital Millennium Copyright Act (DMCA) of 1998 makes it illegal to download copyrighted works (such as books and music) that circumvent Digital Rights Management (or DRM) controls (Digital Millennium Copyright Act, 1998). In other words, people arent allowed to just take music or books from the Internet, without the authors or musicians permission. The aspect this act addresses is the attempt to circumvent DRM devices in order to get that music or book. There are still some loopholes in this, but its tightly enforced on most websites that sell books and music. Another piece of legislation that is trying to be pushed through is that eradicating spyware. Spyware is that nasty stuff that gets on computers whenever someone clicks on a website. Spyware helps measure a consumers Internet habits, then reports them back to whoever (or whatever) developed the spyware. This type of thing is obviously not a desirable scenario and there have been attempts along the way to legislate this situation. ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now