Critical Information Infrastructure Protection and the Law: An Overview of Key IssuesAll critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions. Protection of the critical information infrastructure (CIIP), therefore, is of prime concern. To help with this step, the National Academy of Engineering asked the NRC to assess the various legal issues associated with CIIP. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks. |
From inside the book
Results 1-5 of 86
An Overview of Key Issues National Academy of Engineering, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Critical Information Infrastructure ...
... Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Support ...
An Overview of Key Issues National Academy of Engineering, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Critical Information Infrastructure ...
An Overview of Key Issues National Academy of Engineering, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Critical Information Infrastructure ...
An Overview of Key Issues National Academy of Engineering, National Research Council, Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Committee on Critical Information Infrastructure ...
Contents
EXECUTIVE SUMMARY | 1 |
1 INTRODUCTION AND CONTEXT | 8 |
2 INCREASING THE FLOW OF INFORMATION | 17 |
3 LIABILITY FOR UNSECURED SYSTEMS AND NETWORKS | 35 |
4 MOVING FORWARD | 61 |
APPENDIXES | 75 |
A COMMITTEE MEMBER AND STAFF BIOGRAPHIES | 77 |
B SYMPOSIUM AGENDA | 83 |