2 cissp ® Official Study Guide Eighth Edition


Understand the various types of software license agreements



Download 19,3 Mb.
Pdf ko'rish
bet156/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   152   153   154   155   156   157   158   159   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Understand the various types of software license agreements. 
Contractual license agree-
ments are written agreements between a software vendor and user. Shrink-wrap agreements 
are written on software packaging and take effect when a user opens the package. Click-
wrap agreements are included in a package but require the user to accept the terms during 
the software installation process.
Understand the notification requirements placed on organizations that experience a data 
breach. 
California’s SB 1386 implemented the first statewide requirement to notify individ-
uals of a breach of their personal information. All but three states eventually followed suit 
with similar laws. Currently, federal law only requires the notification of individuals when a 
HIPAA-covered entity breaches their protected health information.
Understand the major laws that govern privacy of personal information in both the United 
States and the European Union. 
The United States has a number of privacy laws that affect 
the government’s use of information as well as the use of information by specific industries, 
such as financial services companies and healthcare organizations that handle sensitive 


Written Lab 
153
information. The EU has a more comprehensive General Data Protection Regulation that 
governs the use and exchange of personal information.
Explain the importance of a well-rounded compliance program. 
Most organizations are 
subject to a wide variety of legal and regulatory requirements related to information security. 
Building a compliance program ensures that you become and remain compliant with these 
often overlapping requirements.
Know how to incorporate security into the procurement and vendor governance process. 
The expanded use of cloud services by many organizations requires added attention to con-
ducting reviews of information security controls during the vendor selection process and as 
Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   152   153   154   155   156   157   158   159   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish