EconPapers    
Economics at your fingertips  
 

The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits

Klaus Brisch ()
Additional contact information
Klaus Brisch: DWF Germany Rechtsanwaltsgesellschaft mbH

Chapter 5 in Cyber Security. Simply. Make it Happen, 2017, pp 37-46 from Springer

Abstract: Abstract Technology is the main way of ensuring that IT security—meets perpetrators on a level playing field with weapons of a similar caliber. But technology cannot solve the problem alone. The law can also play a part in IT security, although it is misguided to assume that legal sanction mechanisms will keep criminal hackers from infiltrating IT infrastructures and harming companies.

Keywords: Critical Infrastructure; Management Board; Unauthorized Access; Product Liability; Safe Harbor (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:

There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-319-46529-6_5

Ordering information: This item can be ordered from
http://www.springer.com/9783319465296

DOI: 10.1007/978-3-319-46529-6_5

Access Statistics for this chapter

More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-04-11
Handle: RePEc:spr:mgmchp:978-3-319-46529-6_5