Information security laws (many of which are also privacy laws) across the globe require you to secure the personal data that you process. The General Data Protection Regulation (GDPR) in Europe, the Data Protection Act in the United Kingdom, and the [...]
Click here to view a map of computer virus threat levels.
Section 43(5) of the ECT Act requires the supplier in an electronic transaction to "utilise a payment system that is sufficiently secure with reference to accepted technological standards at the time of the transaction and the type of transaction concerned." [...]
Information Security policies support compliance in many ways. Vicarious liability Beyond sensitising employees to the risks posed by technology, information security policies minimise the organisation's exposure to vicarious liability for unauthorised or unlawful acts carried out by employees during the [...]