The Law and Its Contribution to IT Security: Legal Framework, Requirements, Limits
Klaus Brisch ()
Additional contact information
Klaus Brisch: DWF Germany Rechtsanwaltsgesellschaft mbH
Chapter 5 in Cyber Security. Simply. Make it Happen, 2017, pp 37-46 from Springer
Abstract:
Abstract Technology is the main way of ensuring that IT security—meets perpetrators on a level playing field with weapons of a similar caliber. But technology cannot solve the problem alone. The law can also play a part in IT security, although it is misguided to assume that legal sanction mechanisms will keep criminal hackers from infiltrating IT infrastructures and harming companies.
Keywords: Critical Infrastructure; Management Board; Unauthorized Access; Product Liability; Safe Harbor (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
There are no downloads for this item, see the EconPapers FAQ for hints about obtaining it.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:mgmchp:978-3-319-46529-6_5
Ordering information: This item can be ordered from
http://www.springer.com/9783319465296
DOI: 10.1007/978-3-319-46529-6_5
Access Statistics for this chapter
More chapters in Management for Professionals from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().