Cyber Law Policy and Standards Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

Question 1: What is the difference between policy and standards?

The primary difference between policy and standard is the different intentions about particular actions while referring to steps to be taken. In this case, the initial goal of the policy is to determine the existence of a certain issue and its coverage (Eastton & Taylor, 2011). It assures the compliance of the individuals with the established legal system. Meanwhile, the standards in their nature are related to the particular level of quality while introducing the control measures (Eastton & Taylor, 2011).

Question 2: Why are guidelines and recommendations optional while policies and standards are mandatory?

It could be said that the guidelines and recommendations have an optional nature, as they have a tendency to propose one of the ways of the actions, which the organization or an individual could follow in a particular situation (Whitman & Mattord, 2011). Meanwhile, the policies and standards could be considered of a higher power, as they identify the issue and determine the necessity to comply with the law regarding the particular issues.

Question 3: Why are policies developed at a high level in the organization?

It remains apparent that policies are developed at a high level of organization for several reasons. One of them is the fact that the management is able to understand the necessity of the policy introduction by comparing it with the company’s needs, vision, values, and mission (Bolles & Hubbard, 2007). Meanwhile, a high level of organization has significant authority and power for the development and establishment of new policies.

Question 4: Why is consistent enforcement critical for cyber policies, standards, and procedures?

In turn, the continuous enforcement of the policies, standards, and procedures is critical to the context of cyber law. This sphere is relatively novel, and its current standards do not cover all of the issues and questions (Kubota, 2007). Meanwhile, technology tends to develop on a regular basis, and this matter determines the necessity to establish new policies and redesign old ones on a regular basis (Kubota, 2007).

Question 5: What is business continuity management?

Business continuity management is a business strategy, which implies the continuous assessment of risks while evaluating the organizational responses to these threats (Hiles, 2010). Meanwhile, it aims at the development of stability of the firm and its resilience to ensure the relevant return of investment for the stakeholders.

Question 6: What is the impact of incomplete or missing information on a security policy?

It could be said the lack of information in the security policy has an adverse impact on the functioning of the organization and its safety. In this case, this matter determines that the absence of coverage of the precise issues might be a cause of the wrongful decision-making and misunderstanding of the presence of the particular actions leading to theft and data leakage (Whitman & Mattord, 2011).

Question 7: What is management’s role in cyber policy development and enforcement?

Meanwhile, it remains apparent that the management’s role cannot be underestimated in the development of the cyber policies, as this entity has a key influence on the standards, procedure, or policy introduction (Bolles & Hubbard, 2007). It could be said that management defines the flow of the processes and identifies the existence of the issue, which has to be addressed to improve the company’s functioning and profitability. In turn, it has a superior power to influence the decision-making process and enforcement of the policies.

Question 8: How is risk management improved, and residual risk decreased through sound cyber policies?

It could be said that the introduction of the cyber policies has a positive influence on the risk management, as it is related to the continuity management and minimizes the risks associated with the theft and leakage of the confidential information. Nonetheless, the residual risks tend to increase since the probability of the data theft continues to rise due to the constant development of technology and gaps in the information security.

References

Bolles, D., & Hubbard, D. (2007). The power of enterprise wide project management. New York, NY: AMACOM.

Eastton, C., & Taylor, J. (2011). Computer crime, investigation, and the law. Boston, MA: Cengage Learning.

Hiles, A. (2010). The definitive handbook of business continuity management. Hoboken, NJ: John Wiley & Sons.

Kubota, T. (2007). Cyberlaw for global e-business: Finance, payments, and dispute resolution. Hershey, PA: Information Science Reference.

Whitman, M., & Mattord, H. (2011). Reading & cases in information security: Law & ethics. Boston, MA: Cengage Learning.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, August 19). Cyber Law Policy and Standards. https://ivypanda.com/essays/cyber-law-policy-and-standards/

Work Cited

"Cyber Law Policy and Standards." IvyPanda, 19 Aug. 2020, ivypanda.com/essays/cyber-law-policy-and-standards/.

References

IvyPanda. (2020) 'Cyber Law Policy and Standards'. 19 August.

References

IvyPanda. 2020. "Cyber Law Policy and Standards." August 19, 2020. https://ivypanda.com/essays/cyber-law-policy-and-standards/.

1. IvyPanda. "Cyber Law Policy and Standards." August 19, 2020. https://ivypanda.com/essays/cyber-law-policy-and-standards/.


Bibliography


IvyPanda. "Cyber Law Policy and Standards." August 19, 2020. https://ivypanda.com/essays/cyber-law-policy-and-standards/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1