Legal, Regulatory, and Contractual Requirements
An information security manager should be cautious about adherence to laws and regulations. Laws and regulations should be addressed to the extent that they impact the organization.
Processes should be in place to scan all new regulations and determine their applicability to the organization.
The information security manager is required to determine the processes and activities that may be impacted and whether existing controls are adequate to address any new regulations. If not, further controls should be implemented to address the new regulations.
Departments affected by any new regulations are in the best position to determine the impact of new regulatory requirements on their processes, as well as the best ways to address them.
Key Aspects from the CISM Exam Perspective
The following are some key aspects from the exam perspective:
Question |
Possible Answer |
Who should determine the control processes for any new regulatory requirements? |
The affected department (as they are in the best position to determine the impact of new regulatory requirements on their processes and the best way to address them) |
What is the first step of an information security manager who notices a new regulation impacting one of the organization's processes? |
To determine the processes and activities that may be impacted To assess whether existing controls meet the regulations |
What is the major focus of privacy law? |
To protect identifiable personal data |
Which factors have the greatest impact on the security strategy? |
Organizational goals and objectives |
Practice Question Set 3
- An information security steering committee has approved the implementation of a bring your own device (BYOD) policy for mobile devices. As an information security manager, what should your first step be?
- To ask management to stop the BYOD policy implementation, stating the associated risk
- To prepare a business case for the implementation of BYOD controls
- To make the end users aware of BYOD risks
- To determine the information security strategy for BYOD
- New regulatory requirements impacting information security will mostly come from which of the following?
- The chief legal officer
- The chief audit officer
- Affected departments
- Senior management
- Primarily, the requirements of an information security program are based on which of the following?
- The IT policy
- The desired outcomes
- The management perceptions
- The security strategy
- Which of the following should be the first step of an information security manager who notices a new regulation impacting one of the organization's processes?
- To pass on responsibility to the process owner for compliance
- To survey the industry practices
- To assess whether existing controls meet the regulation
- To update the IT security policy
- Privacy laws are mainly focused on which of the following?
- Big data analytics
- Corporate data
- Identity theft
- Identifiable personal data
- The information security manager notices a regulation that impacts the handling of sensitive data. Which of the following should they do first?
- Determine the processes and activities that may be impacted.
- Present a risk treatment option to senior management.
- Determine the cost of control.
- Discuss the possible consequences with the process owner.
- The information security manager should address laws and regulations in which way?
- To the extent that they impact the organization
- To meet the certification standards
- To address the requirements of policies
- To reduce the cost of compliance
- What is the most important consideration for organizations involved in cross-border transactions?
- The capability of the IT architecture
- The evolving data protection regulations
- The cost of network bandwidth
- The incident management process
- What should be the next step for the board of directors when they notice new regulations are impacting some of the organization's processes?
- Instruct the information security department to implement specific controls
- Evaluate various solutions to address the new regulations
- Require management to report on compliance
- Evaluate the cost of implementing new controls
- Which of the following factors is the most difficult to estimate?
- Vulnerabilities in the system
- Legal and regulatory requirements
- Compliance timelines
- The threat landscape
- What should the next step be for an information security manager upon noticing new regulations impacting some of the organization's processes?
- To identify whether the current controls are adequate
- To update the audit department about the new regulations
- To present a business case to senior management
- To implement the requirements of new regulations