Understanding the Legal Environment in Organizations

795 Words2 Pages

This case study will overlook the legal environment in an organization, which includes policies, regulations, and laws. This case study will go over a brief overview of what policies, regulations, and laws are, their impacts and a quick overview of policies, regulations, and laws that an organization has to be knowledgeable in and on par with to ensure the confidentiality, integrity, and availability of information and information systems are functioning and within guideline.

A Policy plays an important role in any organization. A Policy outlines a set of rules and procedures that all employees must adhere to, information security policies are important because they help limit the risks associated with employee’s use of information properties. …show more content…

It requires that the annual reports of public companies include an end-of-fiscal-year assessment of the effectiveness of internal control over financial reporting. It also requires that the company's independent auditors attest to, and report on, this assessment. CITATION Ton06 \l 1033 (Noblett, 2006)

Gramm-Leach-Bliley Act

The Gramm-Leach-Bliley Act (GLBA), covers the protection of the privacy and security of financial information collected and used by financial institutions (Banks, Credit Card Companies, investment firms etc.). This act also requires financial institutions to deliver their customers an annual notice of their privacy practices and to allow customers to choose whether they want to share or not to share such information. This act requires that financial institutions establish a complete security program to protect the confidentiality and integrity of financial information in their archives. CITATION Ton06 \l 1033 (Noblett, …show more content…

It safeguards that members, merchants, and service providers maintain the highest information security standard. CISP uses the Payment Card Industry (PCI) Data Security Standard as its outline and it offers tools and measurements needed to protect against cardholder data exposure. The PCI Data Security Standard consists of 12 basic necessities supported by more detailed sub settings. CITATION Ton06 \l 1033 (Noblett, 2006)

In conclusion following policies, regulations, and laws in organizations are the best ways to ensure that your organization has a safe working atmosphere for all of its employees. Also following these policies, regulations, and laws provides your organization with a guideline to adhere to so that your organization can achieve information security and it will ensure that data integrity, availability, and confidentiality of an organization's information system are always on par and working

Open Document