Information Security Law: Control of Digital Assets

Front Cover
Law Journal Press, 2006 - Law - 900 pages
0 Reviews
For most organizations, an effective information security policy is vitally important. In some instances, it is a legal requirement. Information Security Law: Control of Digital Assets provides encyclopedic coverage of both the technologies used to protect a network and the laws and policies that bolster them. It is filled with practical advice on all aspects of implementing effective internal controls, protecting user privacy, preventing computer crimes, leveraging intellectual property and avoiding regulatory scrutiny. Written for lawyers, compliance officers, network administrators, and anyone who oversees the preservation and use of networked data, this important book examines such topics as: ensuring the accuracy of data used to generate financial reports; protecting consumers' personally identifiable information; the Gramm-Leach-Bliley Act's privacy and safeguards rules; HIPAA restrictions on the use of medical information; state and federal remedies for attacks on computer systems; avoiding liability when monitoring computer systems; and more. Whether your responsibilities include securing networks or creating an adequate plan for responding to security incidents, Information Security Law: Control of Digital Assets will make a difficult job much easier.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.


2 Congress 1228
Information Security Policies

16 other sections not shown

Common terms and phrases

About the author (2006)

Mark G. Milone is founder of and Information Technology Counsel at The Boeing Company. His practice includes technology licensing, intellectual property, corporate governance, data privacy, and joint ventures. Mr. Milone has developed legal courses for various organizations such as the SANS Institute and his prior publications include Hacktivism: Securing the National Infrastructure and Biometric Surveillance: Searching for Identity. His most recent course, InfoSec Law: Hacking the U.S. Code, is available at http: // Mr. Milone can be reached at

Bibliographic information