University Report: Legal Restrictions to Information Flow Analysis

Verified

Added on  2022/10/07

|6
|1270
|62
Report
AI Summary
This report delves into the legal restrictions governing information flow, examining the interplay between privacy laws and the necessity of information sharing. It analyzes the legal barriers that restrict information dissemination and the strategies employed to control this flow, emphasizing the importance of public safety and the role of various government agencies, including the Federal Bureau of Investigation and the Department of Defense. The study highlights the evolution of information-sharing strategies, particularly after the events of September 11, 2001, and the impact of the Patriot Act. It also assesses the objectives of these strategies, the challenges in their implementation, and the overall impact on the accessibility and generation of confidential information. The report underscores the importance of balancing information sharing with the protection of sensitive data, offering insights into the complexities of information management within legal and ethical frameworks.
Document Page
Running Head: LEGAL RESTRICTION TO INFORMATION FLOW
LEGAL RESTRICTION TO INFORMATION FLOW
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1LEGAL RESTRICTION TO INFORMATION FLOW
Abstract:
The first section of this study throws lights on the Legal barriers depicted in the privacy
law and also elaborates the reasonability of the sharing of information as described in the privacy
laws. In this context, this study also throws lights on the strategies regarding the control of the
flow of the information. This study reveals that the strategies to control the flow of information,
are formulated or the purpose of public safety. Further this study also talks about the importance
of the prohibition of the information flow, at the global level in the lights of the contemporary
trends regarding cyber regulation. In this context, this study talks about, the initiatives adopted
by Federal Bureau of Investigation for the purpose of protecting the generation of confidential
information with respect to the massive transformation occurred in the fields of security
measurement after the incidents of September 11, 2001. Further this study highlights the new
vision provided by the contemporary strategies for sharing of information. In this context the
initiatives as well as investment done by Department of Defense (DoD) are mentioned. This
study also finds out the objectives of the initiatives adopted by Department of Defense (DoD)
which is to synchronize the sharing or the generation of the information, along with the effective
exchange of information among the government agencies. Further, this study focuses on the
landscapes for the sharing of the information along with the modernized strategies that can
actually improve, the safety regarding the sharing of confidential information. In this connection,
this study shows how the department of defense emphasizes on the improvement of the analysis
of the situation, forces of the adaptability and also on the reduction in the decision making time.
Apart from that the policies adopted in the strategies taken after 2011, are also analyzed along
with the goals as well as objectives of those policies. Finally, the study discusses about the
Document Page
2LEGAL RESTRICTION TO INFORMATION FLOW
timeline regarding the implementation of the policies with respect to the obstacles in the way of
implementation. The conclusion section of this study provides a brief overview of the
departmental as well as the national strategies and their impacts on the accessibility of the
confidential information along with the generation of information (Peltier, 2016).
Introduction:
The purpose of this study is to throw lights on the safety laws regarding the sharing of
information. The memorandum part of this study, talks about the importance of prohibiting the
generation of the confidential information, with a concern for the several levels of the
government of a country (Hipple, et al., 2017 ). Again this study also attempts to point out other
major significances of the prohibition of sharing or generation of the confidential information. In
this context, the strategies discussed in the part 2 of this study, throws lights on the initiatives
adopted by Federal Bureau of Investigation (Ab Rahman & Choo, 2015). Further the landscapes
as well as the strategies as well as the policies provided by laws and jurisdiction are discussed.
The next focus of this study is on the strategies, policies and also their aims and objectives,
declared by the laws and jurisdiction regarding the dissemination of important information that
may harm the public (Soomro, Shah & Ahmed, 2016). Again, the strategies to control
unauthorized dissemination of information, the transformation of the strategies after September
11, 2001, are discussed with reference to the importance of implementing the Patriot Act of 2001
(Nazareth & Choi, 2015). The final sections of this research throw lights on the timeline for
implementation of the strategies along with the barriers of implementation (Kożuch &
Sienkiewicz-Małyjurek, 2015).
Document Page
3LEGAL RESTRICTION TO INFORMATION FLOW
Summary Analysis:
The memorandum part of this research study concentrates on information sharing,
concentrates on the description of the legal barriers such as privacy laws. Along with the barriers
related to the dissemination of the confidential information to protect the privacy the information
related to several governments as well as the general public (Laszka, Felegyhazi & Buttyan,
2015). Further this study analyses the roles of the decision makers as well as the Open Source
Intelligence, to secure online as well as offline information (AlHogail, 2015). This study also
reveals that initiatives taken by the Federal Bureau of Investigation after the incident of
September 11, 2001. Further this study has attempted to analyze the DoD and also the QDR and
national strategies (Korte, 2017). The facts revealed after the analysis of the policies, goals, as
well as objectives of the information strategies of Department of Defense refers to several
benefits of information sharing which are- the achievement of efforts as well as unity across
coalition along with the mission, improvement of the execution regarding the speed of decision,
improvement of adaptability along with the mission operations, improvement of the capability to
anticipate the needs of the resources as well as events (Korte, 2017). Further the research has
thrown lights on the obstacles to implement legal policies and strategies to control privacy
issues.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4LEGAL RESTRICTION TO INFORMATION FLOW
References:
Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling
in the cloud. computers& security, 49, 45-69.
AlHogail, A. (2015). Design and validation of information security culture
framework. Computers in Human Behavior, 49, 567-575.
Hipple, N. K., McGarrell, E. F., O’Brien, M., & Huebner, B. M. (2017). Gun crime incident
reviews as a strategy for enhancing problem solving and information sharing. Journal of
crime and justice, 40(1), 50-67.
Korte, J. (2017). Mitigating cyber risks through information sharing. Journal of Payments
Strategy & Systems, 11(3), 203-214.
Kożuch, B., & Sienkiewicz-Małyjurek, K. (2015). Information sharing in complex systems: a
case study on public safety management. Procedia-Social and Behavioral Sciences, 213,
722-727.
Laszka, A., Felegyhazi, M., &Buttyan, L. (2015). A survey of interdependent information
security games. ACM Computing Surveys (CSUR), 47(2), 23.
Nazareth, D. L., & Choi, J. (2015). A system dynamics model for information security
management. Information & Management, 52(1), 123-134.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more
holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Document Page
5LEGAL RESTRICTION TO INFORMATION FLOW
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]