Critical Information Infrastructure Protection and the Law: An Overview of Key IssuesAll critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions. Protection of the critical information infrastructure (CIIP), therefore, is of prime concern. To help with this step, the National Academy of Engineering asked the NRC to assess the various legal issues associated with CIIP. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks. |
From inside the book
Results 1-5 of 87
... Information Infrastructure Protection and the Law Cynthia A. Patterson, Stewart D. Personick. Infrastructure Protection and the Law Committee on Critical Information Infrastructure Protection and the Law Computer Science and ...
... Information Infrastructure Protection and the Law Cynthia A. Patterson, Stewart D. Personick. THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, DC 20001 NOTICE: The project that is the subject of this report was approved by ...
... Information Infrastructure Protection and the Law Cynthia A. Patterson, Stewart D. Personick. The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and ...
... Information Infrastructure Protection and the Law Cynthia A. Patterson, Stewart D. Personick. COMMITTEE ON CRITICAL INFORMATION INFRASTRUCTURE PROTECTION AND THE LAW STEWART D. PERSONICK, Drexel University, Chair MICHAEL COLLINS ...
... Information Infrastructure Protection and the Law Cynthia A. Patterson, Stewart D. Personick. COMPUTER SCIENCE AND TELECOMMUNICATIONS BOARD DAVID D. CLARK, Massachusetts Institute of Technology, Chair ERIC BENHAMOU, 3Com Corporation ...
Contents
EXECUTIVE SUMMARY | 1 |
1 INTRODUCTION AND CONTEXT | 8 |
2 INCREASING THE FLOW OF INFORMATION | 17 |
3 LIABILITY FOR UNSECURED SYSTEMS AND NETWORKS | 35 |
4 MOVING FORWARD | 61 |
APPENDIXES | 75 |
A COMMITTEE MEMBER AND STAFF BIOGRAPHIES | 77 |
B SYMPOSIUM AGENDA | 83 |