Enterprise Security—Compliance

0x00 Preface

When building safely, be sure to understand the rules that apply to your business and yourself, and follow them carefully.

0x01 Laws and regulations

1. Types of legal systems

1.1 Civil Code

  • The Civil Code is based on rules rather than precedents
  • Civil law systems usually focus primarily on statutory or written laws
  • The civil law system allows lower courts to disobey higher court decisions

1.2 Common law system

  • A legal system based on reached conclusions
  • Common law usually consists of a high court, several intermediate courts of appeal and multiple local courts of first instance. Jurisprudence comes from the top down.
  • Common law can be divided into criminal law, civil law/torts and administrative law

1.3 Criminal law system

  • Based on common law, statutory law or a combination of both
  • Addressing potentially harmful behavior to society
  • Punishment is divided into own deprivation and fine
  • Start with acquiescence of innocence and prove guilt

1.4 Civil/tort law

  • branch of criminal law
  • The defendant should bear legal obligations for the injured party

1.5 Administrative law system

  • Administrative agencies have customized systems and laws to solve problems in many fields including international trade, manufacturing, environment, immigration, etc.

1.6 Common law system

  • Address personal behaviors and behavior patterns
  • Based on the traditions and customs of the region
  • It originated when individuals needed to cooperate and merge into society.
  • Compensation mainly takes the form of fines or services.

1.7 Religious legal system

  • Based on the religious beliefs of the region
  • Define and govern human affairs through divinely revealed knowledge and rules

0x02 Cybercrime and Data Breach

  • computer assisted crime
  • Computer-targeted crime

1. Personally identifiable information

  • full name
  • National ID number
  • family address
  • IP address
  • Vehicle license plate number
  • driver's license number
  • Face, fingerprint or notes
  • Credit Card Number
  • digital ID card
  • Birthday
  • place of birth
  • Genetic information

0x03 Licensing and intellectual property requirements

1. Trade secrets

Trade secrets protect certain types of resources from unauthorized use and from disclosure. Trade secrets specifically refer to all technologies, algorithms, software, secret recipes, etc. held by a company. Business companies will require company employees to sign confidentiality agreements.
http://www.xiuzhou.gov.cn/art/2021/7/6/art_1229548844_59170954.html

2.Copyright

Copyright is usually used to protect an author's documentation, an artist's transformation, a programmer's source code, or a musician's creation of melodies and structures.

3.Trademark

used to protect words, names, symbols, sounds, shapes, colors, devices or combinations of these objects,

4.Patent

A patent is a legal title granted to an individual or organization that gives the patent owner the right to prevent others from using or copying the invention to which the patent relates.
Patents are the strongest form of intellectual property protection.

5. Internal intellectual property protection

Implement additional security measures internally to ensure that resources that are confidential to the organization are appropriately identified and protected.
Businesses must inform employees of the confidentiality or level of confidentiality of the resource and explain to employees the expected behavior related to the resource.

6. Pirated software

Software licensing is divided into:

  • free software
    • shareware
    • Using the Software
  • commercial house arrest
  • academic software
    • open source software

Guess you like

Origin blog.csdn.net/qq_36869808/article/details/130144795