LEADER 03602nam 2200697Ia 450 001 9910960896803321 005 20251117114850.0 010 $a9786610179985 010 $a9780309168083 010 $a0309168082 010 $a9781280179983 010 $a1280179988 010 $a9780309513845 010 $a0309513847 035 $a(CKB)111069351131880 035 $a(SSID)ssj0000132642 035 $a(PQKBManifestationID)12045284 035 $a(PQKBTitleCode)TC0000132642 035 $a(PQKBWorkID)10039124 035 $a(PQKB)10865590 035 $a(MiAaPQ)EBC3375827 035 $a(Au-PeEL)EBL3375827 035 $a(CaPaEBR)ebr10046876 035 $a(OCoLC)923259201 035 $a(Perlego)4736499 035 $a(BIP)22018716 035 $a(EXLCZ)99111069351131880 100 $a20030505d2003 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCritical information infrastructure protection and the law $ean overview of key issues /$fCommittee on Critical Information Infrastructure and the Law, Computer Science and Telecommunications Board, National Academy of Engineering, National Research Council of the National Academies ; Stewart D. Personick and Cynthia A. Patterson, editors 205 $a1st ed. 210 $aWashington, D.C. $cNational Academies Press$dc2003 215 $axvi, 102 p 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780309088787 311 08$a030908878X 320 $aIncludes bibliographical references. 327 $a1. Introduction and context (Rise of CIP as a policy issue) -- 2. Increasing the flow of information (Information sharing framework, (Perceived) Barriers to information sharing, Concluding observations) -- 3. Liability for unsecured systems and networks (Criminal law, Civil liability, Regulation) -- 4. Moving forward (Motivating the private sector, Security and privacy tensions, A Trust network) 330 $aAll critical infrastructures are increasingly dependent on the information infrastructure for information management, communications, and control functions. Protection of the critical information infrastructure (CIIP), therefore, is of prime concern. To help with this step, the National Academy of Engineering asked the NRC to assess the various legal issues associated with CIIP. These issues include incentives and disincentives for information sharing between the public and private sectors, and the role of FOIA and antitrust laws as a barrier or facilitator to progress. The report also provides a preliminary analysis of the role of criminal law, liability law, and the establishment of best practices, in encouraging various stakeholders to secure their computer systems and networks. 606 $aConfidential communications$zUnited States 606 $aComputer security$zUnited States 606 $aComputers$xAccess control$zUnited States 606 $aPrivacy, Right of$zUnited States 615 0$aConfidential communications 615 0$aComputer security 615 0$aComputers$xAccess control 615 0$aPrivacy, Right of 701 $aPersonick$b Stewart D$0771895 701 $aPatterson$b Cynthia A$0261386 712 02$aNational Research Council (U.S.) Committee on Critical Information Infrastructure Protection and the Law. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910960896803321 996 $aCritical information infrastructure protection and the law$94357624 997 $aUNINA