Critical Information Infrastructure Protection and the Law: An Overview of Key IssuesAll critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions. Protection of the critical information infrastructure (CIIP), therefore, is of prime concern. To help with this step, the National Academy of Engineering asked the NRC to assess the various legal issues associated with CIIP. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks. |
From inside the book
Results 1-5 of 15
... University, Chair MICHAEL COLLINS, Lockheed Martin WILLIAM J. COOK, Freeborn & Peters DEBORAH HURLEY, Harvard University DANIEL SCHUTZER, Emerging Technologies, Citigroup W. DAVID SINCOSKIE, Telcordia Technologies RICHARD R. VERMA ...
... University ELAINE COHEN, University of Utah W. BRUCE CROFT, University of Massachusetts at Amherst THOMAS E. DARCIE, University of Victoria JOSEPH FARRELL, University of California at Berkeley JOAN FEIGENBAUM, Yale University WENDY ...
... University BRUCE HAJEK, University of Illinois GEORGE M. HORNBERGER, University of Virginia KENNETH H. KELLER, University of Minnesota MARGARET A. LEMONE, National Center for Atmospheric Research RICHARD J. LIPTON, Georgia Institute of ...
... University; David A. Balto, White & Case LLP; Stanley M. Besen, Charles River Associates; Nicholas M. Donofrio, IBM Corporation; Marc D. Goodman, Decision Strategies; John C. Klensin, AT&T Labs; David J. Loundy, DePaul University ...
You have reached your viewing limit for this book.
Contents
EXECUTIVE SUMMARY | 1 |
1 INTRODUCTION AND CONTEXT | 8 |
2 INCREASING THE FLOW OF INFORMATION | 17 |
3 LIABILITY FOR UNSECURED SYSTEMS AND NETWORKS | 35 |
4 MOVING FORWARD | 61 |
APPENDIXES | 75 |
A COMMITTEE MEMBER AND STAFF BIOGRAPHIES | 77 |
B SYMPOSIUM AGENDA | 83 |