Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 3, Problem 15RQ
Explanation of Solution
Policy:
In order to describe acceptable and unacceptable behavior in workplace by the employees, a body of expectations is defined which is termed as policy.
Law:
Laws are generally rules that mandate or prohibit certain behavior in society.
Difference between policy and Law:
Policy | Law |
In order to describe acceptable and unacceptable behavior in workplace by the employees, a body of expectations is defined which is termed as policy... |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What exactly is a policy? What distinguishes it from a law?
What exactly is a policy? What makes it different from a piece of legislation?
So, what is a policy, exactly? So, how does it differ from any other piece of legislation?
Chapter 3 Solutions
Principles of Information Security
Ch. 3 - Prob. 1RQCh. 3 - Prob. 2RQCh. 3 - Prob. 3RQCh. 3 - Prob. 4RQCh. 3 - Prob. 5RQCh. 3 - Prob. 6RQCh. 3 - Prob. 7RQCh. 3 - Prob. 8RQCh. 3 - Prob. 9RQCh. 3 - Prob. 10RQ
Ch. 3 - Prob. 11RQCh. 3 - Prob. 12RQCh. 3 - Prob. 13RQCh. 3 - Prob. 14RQCh. 3 - Prob. 15RQCh. 3 - Prob. 17RQCh. 3 - Prob. 18RQCh. 3 - Prob. 19RQCh. 3 - Prob. 20RQCh. 3 - Prob. 1ECh. 3 - Prob. 2ECh. 3 - Prob. 3ECh. 3 - Prob. 4ECh. 3 - Prob. 5ECh. 3 - Prob. 1CEDQCh. 3 - Prob. 2CEDQCh. 3 - Prob. 3CEDQCh. 3 - Prob. 1EDM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What is a policy? How is it different from a law?arrow_forwardWhich role is likely to say "no" to anything that is against policy?arrow_forwardPlease keep your responses to no more than three or four at the most. What does it look like to have a policy that puts human rights above development, science, and technology?arrow_forward
- influences how the rights of intellectual property are protected. What are the many different kinds of privileges that one may receive, and how may one gain them? What are the chances that they will be required to surrender their licenses in the years to come?arrow_forwardWhere do you think an organization's information security begins and ends, in your opinion? To put it another way, when does a company's security policy and measures go into effect, and when do they stop? Do you think any of these restrictions will be lifted in the future? Explain how and why this is the case if this is the case. What would be the reason if that was not the case?arrow_forwardWhat are some examples of computer crime? Are the current laws too restrictive or too prohibitive? What new legislation has been passed recently? What is privacy? What is a good definition? Is privacy possible? Is the loss of privacy worth the potential increase in security?arrow_forward
- Laws tell you how to keep private information safe, while ethics tell you how to do it in a way that is morally right. What do you think of privacy?arrow_forwardPlease provide the solution for all paragraphs as required 1. What is the difference between Law and Ethics? Write a short note about types of Law & examples of each. 2. What is a policy? What are the criteria that a policy must meet? 3. List Ten Commandments of computer ethics? 4. What are the ethical and legal issues associated with information system?arrow_forwardWhat is the definition of privacy? Do you know how to keep your personal information safe? Make a list of five methods.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,