Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries, defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions: 1. Who can make the laws applicable to cyberspace and cybersecurity? 2. What laws apply once cybercrime crosses national and international boundaries? Why are they important? 3. Who creates policy and enforces these laws? Provide examples within your paper. Your paper should be three to five pages long and in APA format. You may use your textbook as source material for your assignment. You must also use three outside sources,

Unlike countries, the Internet is not confined to specific national borders or geopolitical boundaries, defying traditional governance. Perform research in the CSU Online Library and the Internet, and answer the following questions: 1. Who can make the laws applicable to cyberspace and cybersecurity? 2. What laws apply once cybercrime crosses national and international boundaries? Why are they important? 3. Who creates policy and enforces these laws? Provide examples within your paper. Your paper should be three to five pages long and in APA format. You may use your textbook as source material for your assignment. You must also use three outside sources,

Cybersecurity Policies without Borders

Cyberspace and Cybersecurity Law Makers

Cybersecurity is how persons, organizations, or bodies work towards reducing cyber attacks by protecting data and programs from being damaged, stolen, or attacked by spammers or hackers. Several bodies provide cyber security laws, including the federal and state governments. The federal government is one of the bodies entrusted with the responsibility of making laws related to cybersecurity. The three major cybersecurity regulations passed by the federal government in the United States include the 1996 Health Insurance Portability and Accountability Act (HIPAA), the Hamm-Leach-Bliley Act enacted in 1999, and the 2002 Homeland Security Act (Kostopoulos, 2017). These three regulations were vital as they ensured that healthcare firms, financial bodies, and federal agencies protected their confidential information against access by unauthorized parties. However, these regulations do not address computer-related industries nor specify the cybersecurity measures that need to be implemented and only require a reasonable level of security to be maintained. The vague language used in drafting the laws found in these regulations gives organizations leeway for an extended set of interpretations (Kostopoulos, 2017). An evident argument is that companies are unwilling to invest sufficiently in securing their data unless the government compels them to do so.

The other entity that can also make cyberspace laws is the state government. State governments can formulate and pass state laws on cybersecurity to foster organizations’ visibility towards various security threats. California is one of the states that passed the Security Breach Act in 2003. This act required all the companies that maintained citizens’ personal information to disclose the details of the security breach upon their occurrence concerning social security number, credit card number, driver’s license number, or any other financial information (Kostopoulos, 2017). Other states in the United States have followed suit by crafting their security breach regulations. During the following year, California also passed the Assembly Bill 1950, which required businesses to maintain a record of citizens’ personal information to establish a reasonable level of security to prevent third-party infiltration (Kostopoulos, 2017). However, an appropriate level of cyber security leaves broader room for interpretation that may make the work of hackers easier concerning the accessibility of confidential information.

Order a similar paper

Get the results you need