Ch4 Flashcards
(37 cards)
Criminal Law
protects society against acts that violate basic principles we believe in
violations of criminal law
prosecuted by Federal and State governements
Civil Law
provides a framework for the transaction of business between people and organizations
violations of civil law
brought to the court and argued by the two affected parties
Administrative Law
- used by government agencies to effectively to carry out their day-to-day business
- Consist of policies, procedures, regulations
- Do NOT require an act of the legislative branch to implement at Feral level
- Do NOT require an act of Congress
- subject to judicial review
- must comply with criminal and civil laws
- protects computers used by goverment or in interstate commerce from a variety of abuses
- provides criminal and civil penalties for those convicted of using virus, worms, Trojan horses and other malicious code to cause damage to computer systems
Computer Fraud & Abuse Act
- outlines steps government must take to protect its own systems from attack
- requires mandatory training for all people involved in managing, using, or operating Federal computers that contain sensitive information
Computer Security Act
Who is responsible for managing Federal government computer systems that process classified and sensitive information
NSA (National Security Agency)
Who manages all Federal government computer systems that are NOT used to process sensitive national security information
NIST (National Institute of Standards & Technology)
guarantees the creators of “original works of authorship” protection against
the unauthorized duplication of their work.
Copyright Law
words, slogans, and logos used to identify a company and its products or
services.
Trademark protection
Patents
- must be new or original
- must be useful and accomplish a task
- must NOT be obvious
intellectual property that is absolutely critical to their business and
signifcant damage would result if it were disclosed to competitors and/or the public
trade secrets
- severe penalties for companies that collect information from young children without parental consent
- consent must be obtained from the parents of children younger than age 13
- Childrens Online Privacy Protection Act (COPPA)
develops Federal government information security program
Government Information Security Reform Act (GISRA)
prohibits the circumvention of copy protection placed in digital media & limits liability of ISPs
Digital Millenium Copyright Act of 1998
provides penalties for individuals found guilty of the theft of trade secrets. Harsher penalties when individuals know information will benefit foreign government
Economic Espionage Act 1996
framework for enforcement of various software licensing agreements such as click-wrap & shrink-wrap agreements
Uniform Computer Information Transaction Act (UCITA)
first statewide requirement for notification to individuals of PII data breaches; currently only HIPAA breaches requires notification by Federal Law
California SB 1386
prudent man rule
Federal Sentencing Guidelines - , requires senior executives to take personal responsibility for ensuring the due care that ordinary, prudent individuals would exercise
what are the three burdens of proof for negligence as defined in the Federal Sentencing Guidelines
- legally recognized obligation
- failed to comply with recognized standards
- the act of negligence must have caused the subsequent damages.
Extends CFAA to infrastructure (railroads, gas pipelines, electrical grids & telecommunication circuits) and makes it a felony
National Information Infrastructure Protection Act
NIIPA
places the burden of maintaining the security and integrity of government information and information systems squarely on the shoulders of individual agency leaders
.Government Information Security Reform Act (GISRA)
federal agencies implement an information security program that covers the agency’s operations to include the activities of contractors
Federal Information Security Management Act (FISMA)