The IT Law Wiki


32,068pages on
this wiki
Add New Page
Add New Page Talk0

Definitions Edit

Computer security Edit

Accountability is

the requirement that actions of an entity may be traced uniquely to that entity."[1]
often an organizational policy requirement and directly supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action."[2]
[t]he property of a system (including all of its system resources) that ensures that the actions of a system entity may be traced uniquely to that entity, which can be held responsible for its actions.[3]
[t]he quality or state that enables attempted and committed violations of computer systems security to be traced to individuals who may then be held responsible.[4]
[the] [p]rinciple that responsibilities for ownership and/or oversight of IS resources are explicitly assigned and that assignees are answerable to proper authorities for stewardship of resources under their control.[5]
[a] process of holding users responsible for actions performed on an information system.[6]

Electronic money Edit

Accountability is "record-keeping of electronic money transactions."[7]

Information technology Edit

Accountability is the process of tracing IT activities to a responsible source.

Security Edit

Accountability is

[t]he security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.[8]
[the] [p]rinciple that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.[9]

References Edit

  1. NIST Special Publication 800-33, at 3; ISO/IEC 7498-2.
  2. Id.
  3. RFC 2828.
  4. Auditing and Financial Management: Glossary of EDP Terminology, at 1.
  5. Practices for Securing Critical Information Assets, Glossary, at 51.
  6. Tax Information Security Guidelines For Federal, State and Local Agencies: Safeguards for Protecting Federal Tax Returns and Return Information, at 150.
  7. Report on Electronic Money, Annex 1, Glossary, at 37.
  8. NIST Special Publication 800-30.
  9. CNSSI 4009, at 2.

See also Edit

Also on Fandom

Random Wiki