This 3-page paper examines legislation that has been directed toward information security protection. Bibliography lists 3 sources.