The Stored Communications Act and workplace privacy

Information Security Laws, Investigations and Ethics

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • NERC compliance strategies

    SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability ... 

  • Are you secure? Adam Putnam says, "Prove it!"

    Rep. Adam Putnam crusades to improve the security of the nation's critical infrastructure. The Florida Republican sounded a wake-up call in the fall of 2003 by drafting, but not filing, the Corporate Information Security Accountability Act. 

  • Comeback kid: Sanjay Kumar on Computer Associates' security strategy

    After a tumultuous several years, Sanjay Kumar believes Computer Associates' security strategy will be what leads the company back to the top. Also in this issue: Ed Skoudis examines the proliferation of combo malware and why the worst may be yet to ... 

  • privacy policy

    A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations. Most websites make their privacy policies available to site visitors.  A privacy page should specify any... 

  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744)

    The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.R. 744), is a bill in the U.S. Congress that would criminalize the unauthorized use of spyware, phishing, and other methods of using the Internet to obtain sensitive pers... 

  • intelligence community

    The term intelligence community refers to government and other public agencies as well as private agencies that gather, assemble, and report information that pertains to world or national security. 

  • lifestyle polygraph

    A lifestyle polygraph is a lie-detector (polygraph) test that is administered as a requirement for employment in certain fields. 

  • HSPD-7 (Homeland Security Presidential Directive No. 7)

    HSPD-7 (Homeland Security Presidential Directive No. 7) was a directive issued by U.S. President George W. Bush in December, 2003 that updated policies intended to protect the country from terrorist attacks. This directive superseded the earlier PDD-... 

  • CALEA (Communications Assistance for Law Enforcement Act)

    CALEA (Communications Assistance for Law Enforcement Act) is a United States federal law that enables the government to intercept wire and electronic communications and call-identifying information under certain circumstances -- in particular, when i... 

  • National Security Agency (NSA)

    The National Security Agency (NSA) is the official U.S. cryptologic (the science of cryptographic design and decryption) organization. 

  • FERPA (Family Educational Rights and Privacy Act of 1974)

    FERPA (Family Educational Rights and Privacy Act of 1974) is legislation that protects the privacy of students' personally identifiable information (PII). The act applies to all educational institutions that receive federal funds. 

  • Electrohippies Collective

    The Electrohippies Collective is an international group of hacktivists based in Oxfordshire, England, whose purpose is to express its displeasure with the use of the Internet "as a tool for corporate communications and propaganda. 

  • hacktivism

    Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. 

  • See more Definitions on Information Security Laws, Investigations and Ethics
About Information Security Laws, Investigations and Ethics

Get news, advice and commentary on information security laws and ethics such as CAN-SPAM, CALEA, information security legislation, vulnerability disclosure, intellectual property, cybercrime, electronic records and more.