COMPSCI 353 Flashcards

(31 cards)

1
Q

What is the Children’s Online Privacy Protection Act (COPPA), and who needs to comply with it?

A

Protects minors online under the age of 13.

Websites/Online services that are directed to kids or know that kids use their services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Children’s Internet Protection Act (CIPA), and who needs to comply with it?

A

Address concerns about children’s access to obscene or harmful content over the internet.

Applies to Websites/Online services, educational institutions, and libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Family Educational Rights and Privacy Act (FERPA), and who needs to comply with it?

A

Gives parents certain rights concerning their children’s education records.

Applies to all Schools/Institutions that receive funding from the federal government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Crime?

A

A behavior that the law makes punishable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Classification of Crimes

A

Felonies, Misdemeanors, and Infractions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Criminal Procedure?

A

Set of rules explaining how the government must handle a criminal case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Deference between Civil and Criminal Procedure

A

Criminal handles cases where someone is accused of a crime

Civil deals with disputes between people or organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Computer Crime?

A

Crime that use computers in anyway to commit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Hacking?

A

Identifying a weakness in a computer system to exploit its weakness to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three types of hackers?

A

Black Hat
White Hat
Gray Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Computer Fraud and Abuse Act (CFAA)

A

The primary U.S. law addressing computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CFAA Section (a)(2)

A

Hacking to obtain information prohibits intentionally accessing a computer without authorization to obtain information from any protected computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CFAA Section (a)(5)

A

Hacking to commit damage prohibits knowingly transmitting or intentionally accessing a computer with or without authorization to cause damage or loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CFAA Section (a)(7)

A

Threats of hacking prohibits threatening to damage a protected computer, demanding money, or threatening to obtain/impair information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three primary ways in which the CFAA could be violated?

A

Code-based
Contract-based
Norms-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the four types of Intellectual property?

A

Patents
Trade secrets
Trademarks
Copyright

17
Q

What is a Patent and how long does it last?

A

Protects new inventions or discoveries.

20 years

18
Q

What is a Trade secret and what are the three basic characteristics?

A

Protect confidential business information that gives a company a competitive edge.

Have Value, Be Unknown, and Be Protected

19
Q

What are Trademarks, and what are the Requirements to register a trademark with USPTO?

A

Protects brand names, logos, or symbols that identify goods or services.

Use of the trademark in interstate commerce and distinctiveness of the trademark.

20
Q

What is Copyright, and what are the three criteria for a work to be copyrightable?

A

Protect original works of authorship like books, music, movies, or software.

Someone copies or uses the work without permission.
Have legal proof that you’re the owner of the work.
Be eligible for benefits such as Statutory damages and Attorney fees.

21
Q

What is Fair Use?

A

Allows people to use someone else’s copyrighted work without permission, but only in specific situations

22
Q

What is the Digital Millennium Copyright Act (DMCA)?

A

Attempts to update copyright laws to respond to challenges of the digital environment

23
Q

What are the three categories of torts?

A

Intentional torts
Strict liability torts
Negligent torts

24
Q

What are the elements of negligence?

A

Duty of Care
Breach of Duty
Causation
Damages

25
What are the defenses to Negligent torts?
Contributory Negligence Comparative Negligence Assumption or Risk
26
Acceptable Use Policies
Written documents that set out practices and restrictions regarding the use of company technology resource
27
Workplace privacy and monitoring policies
Outline the extent to which employee activities and communications may be monitored by the organization
28
Intellectual property policies
Define the ownership, usage, protection, and management of IP created, used, or shared with the organization
29
Data retention and destruction policies
Specify how long various types of data must be retained to comply with legal, regulatory, or business requirements, and how it should be securely destroyed.
30
Security awareness and training policies
Establish the framework for educating employees and stakeholders about cybersecurity risks, best practices, and compliance obligations
31
Compliance with Legal Requirements and Industry Standards
Ensures that the organization adheres to all the applicable laws, regulations, and industry standards relevant to its operations