IT Legal Regulations Investigations and Compliance

Duration 03:00 962 Views

LEGAL, REGULATIONS, INVESTIGATIONS AND COMPLIANCE

Introduction

Hello and Welcome to Lesson 9 of CISSP Certification Course by SimpliLearn! This lesson is about Legal, Regulations, Investigations and Compliance.

Legal, Regulations, Investigations and Compliance is one of the ten domains of the Common Body of Knowledge (CBK) for the CISSP certification exam.

The Legal, Regulations, Compliance, and Investigations domain addresses computer crime laws and regulations; the investigative measures and techniques which can be used to determine if a crime has been committed, methods to gather evidence if it has, as well as the ethical issues and code of conduct for the security professional. Incident handling provides the ability to react quickly and efficiently to malicious technical threats or incidents. The focus is on concepts and internationally accepted methods, processes, and procedures. It is important to highlight the international focus at the very beginning. This lesson will avoid in-depth discussions of country- or region-specific laws, legislation, and regulations. Although some regional examples are presented to clarify certain discussion points, these will be limited to the emphasis of principles common across most, if not all, jurisdictions.

Objectives

According to the (ISC) 2 Candidate Information Bulletin, a CISSP candidate is expected to know the methods for determining whether a computer crime has been committed, the laws that would be applicable for the crime, the laws prohibiting specific types of computer crime, methods to gather and preserve evidence of a computer crime, investigative methods and techniques, and ways to address compliance.

Agenda

The agenda for this lesson is as follows:

We begin with the overview of Computer Crimes. Major Legal Systems will be discussed next. This will be followed by Intellectual Property Law, Privacy, Incident Response, Investigations and Compliance.

Finally we will discuss (ISC) 2 Code of Ethics.


{{detail.h1_tag}}

{{detail.display_name}}
{{author.author_name}} {{author.author_name}}

{{author.author_name}}

{{detail.full_name}}

Published on {{detail.created_at| date}} {{detail.duration}}

  • {{detail.date}}
  • Views {{detail.downloads}}
  • {{detail.time}} {{detail.time_zone_code}}

Registrants:{{detail.downloads}}

Downloaded:{{detail.downloads}}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'On-Demand Webinar'}}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Webinar'}}

Hosted By

Profile

{{author.author_name}}

{{author.author_name}}

{{author.about_author}}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook' }}

About the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook' }}

View {{detail.about_title && detail.about_title != null ? detail.about_title : 'On-Demand Webinar'}}

Webcast

Register Now!

Download the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook'}}!

First Name*
Last Name*
Email*
Company*
Phone Number*

View {{detail.about_title && detail.about_title != null ? detail.about_title : 'On-Demand Webinar'}}

Webcast

Register Now!

{{detail.about_title && detail.about_title != null ? detail.about_title : 'Webinar'}} Expired

Download the {{detail.about_title && detail.about_title != null ? detail.about_title : 'Ebook'}}

Email
{{ queryPhoneCode }}
Phone Number

Show full article video

Name Date Place
{{classRoomData.Date}} {{classRoomData.Place}} View Details

About the Author

{{detail.author_biography}}

About the Author

{{author.about_author}}