While government-mandated security regulations are intended to protect, they often confuse. Take this quiz to find out how fluent you are in the language of information security laws and regulations, and let us know how you did. Click on the link to find the answer within the article's or term's definition.
1.) What governing body oversees and enforces HIPAA compliance?
2.) Which constitutional amendment have you violated if evidence seized by your organization's honeynet has been declared inadmissible in a criminal trial?
3.) The Gramm-Leach-Bliley Act consists of three sections. What section stipulates that financial institutions must implement security programs to protect financial information?
4.) What is another name for the Financial Modernization Act of 1999?
5.) What law stipulates that if there's a security breach of a database containing personal data, the responsible organization must notify each resident for whom it maintained information?
6.) What loosely-defined law was originally conceived to prosecute hackers and spammers?
7.) What law establishes benchmarks used to measure compliance?
8.) What statute allows consumers to find out how their personal information was compromised and for what purpose, thereby requiring companies to provide details of a security breach?
9.) What law consists of two sections, of which IT practitioners are primarily concerned with Title II?
10.) What law allows courts to set damages of up to $2 million when senders of unsolicited bulk e-mail break the law?
How'd you do?
9-10 correct: Compliance Connoisseur
6-8 correct: Compliance Capable
3-5 correct: Compliance Clumsy
0-2 correct: Compliance is a Conundrum
Further test your compliance know-how with this multiple-choice quiz.
LEARN MORE ABOUT COMPLIANCE
- Learn more about security law, investigations and ethics with this Security School lesson.
- See why your auditor plays a key role in security compliance.
- Read best practices for managing compliance with security standards.
- How confident are you in your knowledge of e-mail security?
- Do you know which encryption algorithms to use and when? Put your know-how on the line.
- Test your knowledge of the vulnerability management process.
This was first published in March 2005