Skip to main content
Erschienen in: Journal of Management and Governance 4/2017

08.09.2016

Information security governance: pending legal responsibilities of non-executive boards

verfasst von: Laura Georg

Erschienen in: Journal of Management and Governance | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The study shows that a structural conflict of interest in non-executive boards exists due to missing corporate governance structures and a lack of awareness for legal issues with regard to information security risks. Non-executive boards receive information on strategic security threats as a part of their oversight function to fulfill investor interest in transparency. At the same time, they act as representatives of company stakeholders and have an interest to counteract to information security risks based on the stakeholder’s risk disposition. If not properly structured by corporate governance rules, these different interests may lead to regulatory aberrations on non-executive board level. The study analyses a Deutsche Telekom AG case where non-executive board members, employees, and journalists fell victim to a spying scandal subject to the German telecommunications secrecy law in 2005–2006. The analysis demonstrates how the handling of information security on non-executive board level bears governance risks as well as legal risks that are insufficiently addressed in corporate governance research. The paper contributes to avoid a reproduction of events in the future, by suggesting the principle of a segregation of duties on non-executive boards as well as providing an overview of relevant legislative requirements that clarify tasks of non-executive board members with regard to information security. The study therefore helps protecting corporations and their stakeholders from similar consequences of missing corporate security governance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Health and Safety regulations are not included, since security research acknowledges a clear difference.
 
Literatur
Zurück zum Zitat Aktiengesetz (AktG). 1965, revised last 2015, BGBI. I S. 1089. Aktiengesetz (AktG). 1965, revised last 2015, BGBI. I S. 1089.
Zurück zum Zitat Bailey, P. (2013). Boardroom strategic decision-making style: Understanding the antecedents. Corporate Governance: An International Review, 21(2), 131–146.CrossRef Bailey, P. (2013). Boardroom strategic decision-making style: Understanding the antecedents. Corporate Governance: An International Review, 21(2), 131–146.CrossRef
Zurück zum Zitat Bundesdatenschutzgesetz (BDSG). (1990, revised 2009), BGBI. I, 2254. Bundesdatenschutzgesetz (BDSG). (1990, revised 2009), BGBI. I, 2254.
Zurück zum Zitat Bundestag. (2015). Gesetz zur Erhöhung der Sicherheit informationstechnischer System (IT-Sicherheitsgesetz), Bundesanzeiger. Bundestag. (2015). Gesetz zur Erhöhung der Sicherheit informationstechnischer System (IT-Sicherheitsgesetz), Bundesanzeiger.
Zurück zum Zitat Christiansen, C. A., & Westervelt, R. (2015). Security in the 3rd platform: Marching toward proactive defense. IDC Research, 6. Christiansen, C. A., & Westervelt, R. (2015). Security in the 3rd platform: Marching toward proactive defense. IDC Research, 6.
Zurück zum Zitat Committee of Sponsoring Organizations of the Treadway Commission (COSO). (2014). Enterprise risk management—Integrated framework. New York: AICPA. Committee of Sponsoring Organizations of the Treadway Commission (COSO). (2014). Enterprise risk management—Integrated framework. New York: AICPA.
Zurück zum Zitat Däubler-Gmelin, H., Merzhäuser, M., Rothbauer, H., Baum, G., Reiter, J., & Methner, O. (2011). Bericht der Anwälte. 51. Däubler-Gmelin, H., Merzhäuser, M., Rothbauer, H., Baum, G., Reiter, J., & Methner, O. (2011). Bericht der Anwälte. 51.
Zurück zum Zitat Department of Defense. (2011). DoD Strategy. Supra note 14, at 10–11. Department of Defense. (2011). DoD Strategy. Supra note 14, at 10–11.
Zurück zum Zitat Di Pietra, R., Grambovas, C. A., Raonic, I., & Riccaboni, A. (2008). The effects of board size and ‘busy’ directors on the market value of Italian companies. Journal of Management and Governance, 12(1), 73–91.CrossRef Di Pietra, R., Grambovas, C. A., Raonic, I., & Riccaboni, A. (2008). The effects of board size and ‘busy’ directors on the market value of Italian companies. Journal of Management and Governance, 12(1), 73–91.CrossRef
Zurück zum Zitat European Commission. (2013). Proposal for Directive to secure a high common level of network and information security across the Union. COM 48. European Commission. (2013). Proposal for Directive to secure a high common level of network and information security across the Union. COM 48.
Zurück zum Zitat European Council. (2012). Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation). European Council. (2012). Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).
Zurück zum Zitat European Union. (2006). 8th Company Law Directive, Directive 2006/43/EC. European Union. (2006). 8th Company Law Directive, Directive 2006/43/EC.
Zurück zum Zitat Garg, A., Curtis, J., & Halper, H. (2003). Quantifying the financial impact of IT security breaches. Information Management and Computer Security, 2(11), 74–83.CrossRef Garg, A., Curtis, J., & Halper, H. (2003). Quantifying the financial impact of IT security breaches. Information Management and Computer Security, 2(11), 74–83.CrossRef
Zurück zum Zitat Gurevitch, M., & Levy, M. R. (Eds.). (1985). Mass communication review yearbook. Beverly Hills: Sage. Gurevitch, M., & Levy, M. R. (Eds.). (1985). Mass communication review yearbook. Beverly Hills: Sage.
Zurück zum Zitat Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., et al. (2012). The law of cyber-attack. California Law Review, 100(4), 817–886. Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., et al. (2012). The law of cyber-attack. California Law Review, 100(4), 817–886.
Zurück zum Zitat Hilb, M. (2011). Redesigning corporate governance: Lessons learnt from the global financial crisis. Journal of Management and Governance, 15(4), 533–538.CrossRef Hilb, M. (2011). Redesigning corporate governance: Lessons learnt from the global financial crisis. Journal of Management and Governance, 15(4), 533–538.CrossRef
Zurück zum Zitat Hilgartner, S., & Bosk, C. L. (1988). The rise and fall of social problems: A public arena model. American Journal of Sociology, 94(7), 53–78.CrossRef Hilgartner, S., & Bosk, C. L. (1988). The rise and fall of social problems: A public arena model. American Journal of Sociology, 94(7), 53–78.CrossRef
Zurück zum Zitat Huse, M., Hoskisson, R., Zattoni, A., & Viganò, R. (2011). New perspectives on board research: Changing the research agenda. Journal of Management and Governance, 15(1), 5–28.CrossRef Huse, M., Hoskisson, R., Zattoni, A., & Viganò, R. (2011). New perspectives on board research: Changing the research agenda. Journal of Management and Governance, 15(1), 5–28.CrossRef
Zurück zum Zitat International Organization for Standardization. (2013). ISO/IEC 27001:2013 Information technology—Security techniques—Information security management systems—Requirements, Geneva. International Organization for Standardization. (2013). ISO/IEC 27001:2013 Information technologySecurity techniquesInformation security management systemsRequirements, Geneva.
Zurück zum Zitat Johnsten, L., & Shearing, C. (2003). Governing security: Explorations in policing and justice (pp. 281–297). New York: Routhledge. Johnsten, L., & Shearing, C. (2003). Governing security: Explorations in policing and justice (pp. 281–297). New York: Routhledge.
Zurück zum Zitat Kowalski, S. (1994). Do computer security models model computer crime. Stockholm: Royal Institute of Technology. Kowalski, S. (1994). Do computer security models model computer crime. Stockholm: Royal Institute of Technology.
Zurück zum Zitat Lippert, R. K., Walby, K., & Steckle, R. (2013). Multiplicities of corporate security: Identifying emerging types, trends and issues. Security Journal, 26, 206–221.CrossRef Lippert, R. K., Walby, K., & Steckle, R. (2013). Multiplicities of corporate security: Identifying emerging types, trends and issues. Security Journal, 26, 206–221.CrossRef
Zurück zum Zitat Lok, J. (2010). Institutional logics as identity projects. Academy of Management Journal, 53(6), 1305–1335.CrossRef Lok, J. (2010). Institutional logics as identity projects. Academy of Management Journal, 53(6), 1305–1335.CrossRef
Zurück zum Zitat Martin, J. (1973). Security, accuracy, and privacy in computer systems. New Jersey: Englewood Cliffs: Prentice-Hall. Martin, J. (1973). Security, accuracy, and privacy in computer systems. New Jersey: Englewood Cliffs: Prentice-Hall.
Zurück zum Zitat Melde- und Analysestelle Informationssicherung (MELANI). (2011). Informationssicherung: Lage in der Schweiz und international. Halbjahresbericht 2010/II, 45. Melde- und Analysestelle Informationssicherung (MELANI). (2011). Informationssicherung: Lage in der Schweiz und international. Halbjahresbericht 2010/II, 45.
Zurück zum Zitat Neidhardt, F. (1994). Öffentlichkeit, öffentliche Meinung, soziale Bewegungen. Kölner Zeitschrift für Soziologie und Sozial-Psychologie, 34, 7–41. Neidhardt, F. (1994). Öffentlichkeit, öffentliche Meinung, soziale Bewegungen. Kölner Zeitschrift für Soziologie und Sozial-Psychologie, 34, 7–41.
Zurück zum Zitat Petrick, J. A., & Scherer, R. F. (2003). The Enron scandal and the neglect of management integrity capacity. American Journal of Business, 18(1), 37–50.CrossRef Petrick, J. A., & Scherer, R. F. (2003). The Enron scandal and the neglect of management integrity capacity. American Journal of Business, 18(1), 37–50.CrossRef
Zurück zum Zitat PriceWaterhouseCoopers. (2015). Leading in extraordinary times, The 2015 US CEO Survey, in CEOs’ words. 1–30. PriceWaterhouseCoopers. (2015). Leading in extraordinary times, The 2015 US CEO Survey, in CEOs’ words. 1–30.
Zurück zum Zitat Rainer, R. K., Marshall, T. E., Knapp, K. J., & Montgomery, G. H. (2007). Do information security professionals and business managers view information security issues differently? Information Systems Security, 16, 100–108.CrossRef Rainer, R. K., Marshall, T. E., Knapp, K. J., & Montgomery, G. H. (2007). Do information security professionals and business managers view information security issues differently? Information Systems Security, 16, 100–108.CrossRef
Zurück zum Zitat Sarbanes-Oxley-Act (SOX). (2002). Public Law No. 107–204. Washington, DC: GPO. Sarbanes-Oxley-Act (SOX). (2002). Public Law No. 107–204. Washington, DC: GPO.
Zurück zum Zitat Schwarz, D., Ferrillo, P., & Gotshal, W. (2014). Cyber Security and Cyber Governance: Federal Regulation and Oversight—Today and Tomorrow. Harvard Law School Forum on Corporate Governance and Financial Regulation, September 10. Schwarz, D., Ferrillo, P., & Gotshal, W. (2014). Cyber Security and Cyber Governance: Federal Regulation and Oversight—Today and Tomorrow. Harvard Law School Forum on Corporate Governance and Financial Regulation, September 10.
Zurück zum Zitat Shleifer, A., & Vishny, R. W. (1997). A survey of corporate governance. The Journal of Finance, 52(2), 737–783.CrossRef Shleifer, A., & Vishny, R. W. (1997). A survey of corporate governance. The Journal of Finance, 52(2), 737–783.CrossRef
Zurück zum Zitat Siponen, M. T. (2001). An analysis of the recent IS security development approaches: Descriptive and prescriptive implications. In G. Dhillon (Eds.), Information security management: Global challenges in the New Millennium (pp. 101–123). Idea Group Publication, Hershey Siponen, M. T. (2001). An analysis of the recent IS security development approaches: Descriptive and prescriptive implications. In G. Dhillon (Eds.), Information security management: Global challenges in the New Millennium (pp. 101–123). Idea Group Publication, Hershey
Zurück zum Zitat Telekommunikationsgesetz (TKG). (2004). BGBI. I S. 1190. Telekommunikationsgesetz (TKG). (2004). BGBI. I S. 1190.
Zurück zum Zitat Tzu, S. (1994). The art of war. Barnes & Noble. Tzu, S. (1994). The art of war. Barnes & Noble.
Zurück zum Zitat Turnbull Report. (1999). Internal control: Guidance for directors on the combines code, Institute of Chartered Accountants in England and Wales. Turnbull Report. (1999). Internal control: Guidance for directors on the combines code, Institute of Chartered Accountants in England and Wales.
Zurück zum Zitat Yatim, P. (2010). Board structures and the establishment of a risk management committee by Malaysian listed firms. Journal of Management and Governance, 14(1), 17–36.CrossRef Yatim, P. (2010). Board structures and the establishment of a risk management committee by Malaysian listed firms. Journal of Management and Governance, 14(1), 17–36.CrossRef
Zurück zum Zitat Zajac, E. J., & Westphal, J. D. (2004). The social construction of market value: Institutionalization and learning perspectives on stock market reactions. American Sociological Review, 69(3), 433–457.CrossRef Zajac, E. J., & Westphal, J. D. (2004). The social construction of market value: Institutionalization and learning perspectives on stock market reactions. American Sociological Review, 69(3), 433–457.CrossRef
Zurück zum Zitat Zaman, M. (2001). Turnbull, generating undue expectations of the corporate governance role of audit committees. Managerial Auditing Journal, 16(1), 5–9.CrossRef Zaman, M. (2001). Turnbull, generating undue expectations of the corporate governance role of audit committees. Managerial Auditing Journal, 16(1), 5–9.CrossRef
Metadaten
Titel
Information security governance: pending legal responsibilities of non-executive boards
verfasst von
Laura Georg
Publikationsdatum
08.09.2016
Verlag
Springer US
Erschienen in
Journal of Management and Governance / Ausgabe 4/2017
Print ISSN: 1385-3457
Elektronische ISSN: 1572-963X
DOI
https://doi.org/10.1007/s10997-016-9358-0

Weitere Artikel der Ausgabe 4/2017

Journal of Management and Governance 4/2017 Zur Ausgabe

Premium Partner