There are several legal issues associated with data breaches in addition to federal laws such as HIPPA, Gramm-Leach-Bliley, the Computer Fraud and Abuse Act, the Computer Security Act
and the Fair and Accurate Credit Transactions Act that require companies to maintain security over specified information.
The Information Security and Privacy Advisory Board (ISPAB), created by the Computer Security Act
of 1987, is drawing attention to the issue because the number of wirelessly accessible devices is on the rise.
Building upon the Computer Security Act
of 1987 (P.
A major augmentation of NBS's responsibilities develop standards and guidelines for Federal computer systems occurred in 1987 when the Computer Security Act
Computer System Security and Privacy Advisory Board, a statutory body created by the Computer Security Act
of 1987; it advises the United States government on societal impacts of computer technology and is involved with both information system security and cryptography.
All of this debate is the result of the Computer Security Act
of 1987 which called for creation of a national standard for computer encryption.
I also thought their treatment of the Computer Fraud and Abuse Act of 1986 and the Computer Security Act
of 1987 was excellent.
The NCSC also remains committed to providing technical support to the National Institute of Standards and Technology to foster the availability of products to protect unclassified and sensitive information pursuant to the Computer Security Act
President Reagan earlier this month signed into law the Computer Security Act
of 1987, which directs federal agencies to improve their computer security practices.
Hearings were held in june and earlier this fall on the Computer Security Act
of 1985, sponsored by Representative Dan Glickman.
Appendix III of the Circular incorporates responsibilities for computer security as laid out in the Computer Security Act
Congress should also move to strengthen the independence of NIST, which has apparently not only used the National Security Agency's skills in cryptography (as required by the Computer Security Act
of 1987) but also appears to be all too eager to adopt its policy interests as well.