Vērtējums:
Publicēts: 01.12.1996.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Computer Security and the Law', 1.
  • Eseja 'Computer Security and the Law', 2.
  • Eseja 'Computer Security and the Law', 3.
  • Eseja 'Computer Security and the Law', 4.
  • Eseja 'Computer Security and the Law', 5.
  • Eseja 'Computer Security and the Law', 6.
Darba fragmentsAizvērt

IV. Conclusion
The development of effective computer security law and public policy cannot be accomplished without cooperation between the technical and legal communities. The inherently abstruse nature of computer technology and the importance of social issues it generates demands the combined talents of both. At stake is not only a fair and just interpretation of the law as it pertains to computers, but more basic issues involving the protection of civil rights. Technological developments have challenged these rights in the past and have been met with laws and public policies which have regulated their use. For example the use of the telegraph and telephone gave rise to privacy laws pertaining to wire communications. We need to meet advances in automated information technology with legislation that preserves civil liberties and establishes legal boundaries for protecting confidentiality, integrity, and assured service. Legal and computer professionals have a vital role in meeting this challenge together.

Atlants