Chapter 4: Laws, Regulations, and Compliance Flashcards

1
Q

Criminal Law

A

Protect society against acts that violate the basic principles we believe in. Violations prosecuted by federal and state governments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Civil Law

A

Provides the framework for the transaction of business between people and organizations. Violations brought to the court and argued by the two affected parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Administrative Law

A

Used by government agencies to effectively carry out their day-to-day business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CFAA

A

Computer Fraud and Abuse Act
Protects computers used by the government or in interstate commerce from a variety of abuses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FISMA

A

Federal Information Security Management Act
Requires that federal agencies implement an information security program that covers the agency’s operations. Also includes the activities of their contractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NIST SP 800-171

A

Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
Compliance with this standard’s security controls is often included as a contractual requirement by government agencies. Federal contractors must often comply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIST SP 800-53

A

Security and Privacy Controls for Information Systems and Organizations
Required for use in federal computing systems and also commonly used as an industry benchmark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NIST CSF

A

Cybersecurity Framework
Set of standards to serve as a voluntary risk-based framework for securing information and systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

National Cybersecurity Protection Act

A

Charged DHS with establishing a national cybersecurity and communications integration center. Share cybersecurity info with civilian organizations (CISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Copyrights

A

Protect original works of authorship, such as books, articles, poems, and songs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trademarks

A

Names, slogans, and logos that identify a company, product, or service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Patents

A

Provide protection to the creators of new inventions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trade Secrets

A

Protect the operating secrets of a firm (KFC secret herbs and spices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DMCA

A

Digital Millennium Copyright Act
Prohibits the circumvention of copy protection mechanisms placed in digital media and limits the liability of internet service providers for the activities of their users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fourth Amendment

A

Secure against unreasonable search and seizure. Now expanded to include wiretapping and other invasions of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ECPA

A

Electronic Communication Privacy Act
Makes it a crime to invade the electronic privacy of an individual, including monitoring email and VOIP

17
Q

CALEA

A

Communications Assistance for Law Enforcement Act
Amends the ECPA. Requires all communications carriers to make wiretaps possible for law enforcement with appropriate court order.

18
Q

Economic Espionage Act of 1996

A

Provides penalties for individuals found guilty of the theft of trade secrets. Harsher penalties apply when the individual knows that the information will benefit a foreign government.

19
Q

Contractual License Agreements

A

Written agreements between a software vendor and a user

20
Q

Shrink-Wrap Agreements

A

Written on software packaging and take effect when a user opens the package

21
Q

Click-Through Agreements

A

Included in a package but require the user to accept the terms during the software installation process

22
Q

HIPAA

A

Health Insurance Portability and Accountability Act
Includes privacy and security regulations requiring strict security measures for any party that processes or stores private medical information

23
Q

HITECH

A

Health Information Technology for Economic and Clinical Health Act
Amended HIPAA’s privacy and security requirements. Requires any relationship between a covered entity and a business associate to be governed by a BAA
Also added the Data Breach Rule. Must notify affected individuals. Must notify secretary of health and media if breach affects more than 500 individuals.

24
Q

COPPA

A

Children’s Online Privacy Protection Act

25
Q

GLBA

A

Gramm-Leach-Bliley Act of 1999. Covers banking information

26
Q

USA PATRIOT Act

A

After 9/11, broadened powers of law enforcement and intelligence agencies across a number of areas, including when monitoring electronic communications. Easier to do so, harsher punishments

27
Q

FERPA

A

Family Education Rights and Privacy Act
Like HIPAA but for any school that accepts federal funding

28
Q

GDPR

A

General Data Protection Regulation.
European privacy law that applies to all organizations that collect or process data from EU residents. Even applies to orgs not based in EU if they collect information about EU residents.
Requires businesses to limit what they collect and why, to be transparent about it, to secure it, to take responsibility for it, and to remove it at request of the user

29
Q

PIPEDA

A

Personal Information Protection and Electronic Documents Act
Canadian privacy law that restricts how commercial businesses can collect, use, and disclose personal info

30
Q

CCPA

A

California Consumer Privacy Act
Modeled after GDPR. Gives consumers the right to know what info is collected and shared by companies as well as the right to be forgotten.

31
Q

PCI DSS

A

Payment Card Industry Data Security Standard
Governs security of credit card information. Not dictated by law but by contractual obligation