International review of criminal policy - Nos. 43 and 44/International security of information systems

International review of criminal policy - Nos. 43 and 44
International review of criminal policy - United Nations Manual on the prevention and control of computer-related crime
Introduction
V. CRIME PREVENTION IN THE COMPUTER ENVIRONMENT
G. International security of information systems
677914International review of criminal policy - Nos. 43 and 44 — International review of criminal policy - United Nations Manual on the prevention and control of computer-related crime
Introduction
V. CRIME PREVENTION IN THE COMPUTER ENVIRONMENT
G. International security of information systems
G. International security of information systems

234. Lack of international coordination and cooperation can have detrimental effects on national and international economies, on trade and on participation in social, cultural and politic life. International understanding of, and domestic implementation of measures that are required to enhance the security of information systems and facilitate the international exchange of data and commerce are important. Confidence that countries are abiding by security principles promotes confidence in international trade and commerce.

235. It has been noted throughout this Manual that the present measures, practices, procedures and institutions may not adequately meet the challenges posed. There is a need for clarity, predictability, certainly and uniformity of rights and obligations, of enforcement of rights, and of recourse and redress for the violation of rights relating to information systems and their security.

236. The OECD guidelines for the security of information systems were developed to provide a foundation on which countries and the private sector acting singly and in concert may construct a framework for the security of information systems. The framework includes laws code s of conduct, technical measures, management and user practices and public education and awareness activities. The guidelines are intended to serve as a benchmark against which Governments, the public sector, the private sector and society may measure their progress.

237. The guidelines are addressed to the information systems. They are intended to accomplish the following:

  1. Promote cooperation between the public and private sectors in the development and implementation of such measures, practices and procedures;
  2. Foster confidence in information systems and the manner in which they are provided and used;
  3. Facilitate development and use of information systems, nationally and internationally;
  4. Promote international cooperation in achieving security of information systems."

238. guidelines are based on nine principles:

  1. Accountability principle
    The responsibilities and accountability of owners, providers and users of information systems and other parties concerned with the security of information systems should be explicit.
  2. Awareness principle
    In order to foster confidence in information systems, owners, providers and users and other parties should readily be able, consistent with maintaining security, to gain appropriate knowledge of and be informed about the existence and general extant of measures, practices and procedures for the security of information systems.
  3. Ethics principle
    Information systems and the security of information systems should be provided and used in such a manner that the rights and legitimate interests of others are respected.
  4. Multidisciplinary principles
    Measures, practices and procedures for the security of information systems should take account of and address all relevant considerations and viewpoints, including technical, administrative, organizational, operational, commercial, educational and legal considerations and viewpoints.
  5. Proportionality principle
    Security levels, costs, measures, practices and procedures should be appropriate and proportionate to the value of and degree of reliance on the information system and to be severity, probability and extent of potential harm, as the requirements for security vary depending on the information system.
  6. Integration principle
    Measures, practices and procedures for the security of information systems should be coordinated and integrated with each other and other measures, practice and procedures of the organization so as to create a coherent system of security.
  7. Timelines principle
    Public and private parties, at both the national and international levels, should act in a timely and coordinated manner to prevent and to respond to branches of security of information systems.
  8. Reassessment principle
    The security of information systems should be reassessed periodically, as information systems and the requirements for their security vary over time.
  9. Democracy principle
    The security of information systems should be compatible with the legitimate use and flow of data and information in a democratic society."


This work is excerpted from an official document of the United Nations. The policy of this organisation is to keep most of its documents in the public domain in order to disseminate "as widely as possible the ideas (contained) in the United Nations Publications".

Pursuant to UN Administrative Instruction ST/AI/189/Add.9/Rev.2 available in English only, these documents are in the public domain worldwide:

  1. Official records (proceedings of conferences, verbatim and summary records, …)
  2. United Nations documents issued with a UN symbol
  3. Public information material designed primarily to inform the public about United Nations activities (not including public information material that is offered for sale).

Public domainPublic domainfalsefalse