Information Security Ethics and Laws
1. Identify at least four laws pertaining to Information security (in any capacity)
2. Create a table with the following titles: Law; Description; Strength; Weakness; and update needed. Similar to the following:
Law
|
Description
|
Strength
|
Weakness
|
Update Needed
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fill in the table, providing details of the strengths and weaknesses of each law. Identify if you feel an update is needed to the law and why.