Cyberlaw_Context_Flashcards

(16 cards)

1
Q

Term

A

Definition and Context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CFAA (Computer Fraud and Abuse Act)

A

A U.S. law that criminalizes unauthorized access to computer systems. | A hacker using stolen credentials to access a company’s internal database would be charged under the CFAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DMCA (Digital Millennium Copyright Act)

A

A law protecting copyrighted digital content and banning circumvention of digital rights management (DRM). | If someone bypasses Netflix’s DRM to download and share movies, that’s a DMCA violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethical Relativism

A

The belief that morality is culturally defined and no universal moral standard exists. | A company operating in a country with weak privacy laws may justify invasive tracking, claiming it’s locally acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Utilitarianism (Ethics Theory)

A

Ethical choices should aim to produce the greatest good for the greatest number. | A company deciding to collect minimal user data to reduce privacy risks and increase trust is applying utilitarian logic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HIPAA (Health Insurance Portability and Accountability Act)

A

U.S. law protecting sensitive patient health data. | A hospital employee leaking patient records without consent is violating HIPAA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GDPR (General Data Protection Regulation)

A

European Union regulation that governs data privacy and gives individuals control over personal data. | A website failing to get explicit consent before tracking EU users with cookies violates GDPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Insider Threat

A

A security risk that originates from people within the organization. | An IT admin leaking internal documents due to personal grievances is an insider threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social Engineering

A

Manipulating individuals to gain unauthorized access to information or systems. | A scammer pretending to be IT support and tricking an employee into giving login credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Whistleblower

A

An individual who exposes illegal or unethical activity within an organization. | Edward Snowden leaked NSA surveillance practices, acting as a whistleblower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Informed Consent (in Privacy)

A

The principle that individuals must knowingly agree to data collection or use. | A mobile app that hides its tracking policies deep in the Terms of Service lacks informed consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stare Decisis

A

The legal principle of using precedent to decide future cases. | A judge uses a prior ruling on digital search and seizure to determine a similar cybercrime case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Copyright Infringement

A

Unauthorized use of copyrighted material. | Uploading an artist’s song to YouTube without permission is copyright infringement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Signature

A

Cryptographic validation that verifies the authenticity and integrity of a digital message. | A signed software update assures users it came from the real developer and hasn’t been tampered with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Due Care vs. Due Diligence

A

Due diligence is researching risks; due care is actively protecting against them. | A company conducting background checks shows due diligence; encrypting user data is due care.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fourth Amendment (in cyber context)

A

Protects against unreasonable searches and seizures, applied to digital devices. | Police need a warrant to search your smartphone under the Fourth Amendment.