Law & Ethics Flashcards

(50 cards)

1
Q

Describe the 4th Amendment

A

The Fourth Amendment was added to the U.S. constitution in order to protect the rights of United States Citizens from being violated by a member of the U.S. Government with respect to their privacy and property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define the term “Search”

A

A Search is the examining of something or somebody in order to discover content of any concealed item.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Be able to discuss Katz v. United States (Part 1 & 2)

A
  1. The first part of the Katz test asks if the individual believes they had a reasonable expectation of privacy.
  2. The second part of the Katz test looks at the individual’s subjective belief that they have an expectation of privacy and determines if society thinks this person’s expectation is something that they would believe as well.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How we determine whether or not the reasonable expectation of privacy has been violated or not is by looking at two questions commonly referred to as the Katz test as a result of Katz v. United States

A

1) Does the individual’s conduct reflect that he or she believes he or she has an actual, or subjective, expectation of privacy?
2) Is the individual’s subjective expectation of privacy “one that society is prepared to recognize as [objectively] ‘reasonable?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe 3rd Party Doctrine.

A

The third party doctrine is a series of Supreme Court decisions that say individuals can lose Fourth Amendment protections when those individuals relinquish control of that information to third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is how employees are notified that their employer has retained rights to access or inspect information

(Written employment policies and computer log on “banners” are particularly important in cases that consider whether government employees enjoy a reasonable expectation of privacy in government computers.)

A

Consent banners or Notification of Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Policies should be good as written, communicated or enforced because …

A

If the policy is written too narrowly, it may not completely waive the government employee’s reasonable expectation of privacy against the search that the government plans to execute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Do members of the Military have an expectation of Privacy on AF Networks? Why?

A

Monitoring use of a computer network does not violate the law after users view an appropriate network banner informing them that use of the network constitutes consent to monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Consent could be either _____ or implied

A

consent may be either explicit or implied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explicit consent can be _____ or verbal

A

Written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Wiretap Act?

Wiretap is also referred to as Title III

A

The statute prohibits using an electronic, mechanical, or other device to intercept private wire, oral, or electronic communications between the parties unless one of several statutory exceptions applies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List the 7 exceptions to the Wiretap Act

A

1) Interception pursuant to a § 2518 court order (warrant);
2) The ‘provider’ exception
3) The ‘consent’ exceptions
4) The ‘computer trespasser’ exception,
5) The ‘extension telephone’ exception,
6) The ‘inadvertently obtained criminal evidence’ exception
7) The ‘accessible to the public’ exception,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Pen/Trap Statute states

A

it is unlawful for anyone to install or use a pen register or a trap and trace device without first obtaining a court order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the difference(s) between ECS (Electronic Communication Service) & RCS(Remote Computing Service)

A

ECS is any wire, radio, electromagnetic, photo optical or photo electronic facilities used for the transmission of wired or electronic communications, and any computer facilities or related electronic equipment for the electronic storage of such communications.

An RCS is similar to and ECS, with the exception that it provides its services to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List the 12 Exceptions to the “No Disclosure without Consent” Rule in the Privacy Act.

A
  1. “Need to know” within agency
  2. Required FOIA disclosure
  3. Routine uses
  4. Disclosure to Census Bureau
  5. Statistical Research
  6. National Archives
  7. Law enforcement request
  8. Emergency Circumstances
  9. Congress
  10. General Accountability Office
  11. Court Order
  12. Debt Collection Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Briefly describe Health Insurance Portability and Accountability Act (HIPAA)

A

Except for purposes of treatment, payment, healthcare operations and other exceptions; other uses and disclosures of protected health information are generally prohibited without the written authorization of the patient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Disclosure of Psychotherapy notes are authorized in these cases

A
  • When required by law or Government regulation;
  • For public health purposes;
  • About victims of abuse or neglect;
  • For health oversight activities authorized by law;
  • For judicial or administrative proceedings;
  • For law enforcement purposes;
  • Concerning decedents in limited circumstances;
  • For cadaveric organ, eye, or tissue donation purposes;
  • For research involving minimal risk;
  • To avert a serious threat to health or safety;
  • For specialized Government functions, including certain activities relating to Armed Forces personnel; and
  • For workers’ compensation programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Copyright

A

Copyright protects the expression of an idea (books, movies, music, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Trademark

A

Trademark protects marks used by a business to distinguish themselves from competitors in the eyes of consumers. A trademark can be a name, logo, sound, etc. The Nike Swoosh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Patent

A

A patent protects useful inventions and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Trade Secret

A

Trade Secrets are rarely used. It is used as an alternative to a patent and protects inventions/secret formulas/etc.

22
Q

Digital Millennium Copyright Act (DMCA)

A

The purpose of copyright law is to protect the owner of an owner of the intellectual property from copyright infringement.

23
Q

Four Safe Harbors of the DMCA

A
  • Transitory digital network communications
  • System caching
  • Information residing on systems or networks at the direction of users
  • Information location tools
24
Q

____ _____ results when somebody knows of the direct infringement of another and substantially participates in that infringement, such as inducing, causing, or materially contributing to the infringing conduct.

A

Contributory Infringement

25
___ ___ results when there has been a direct infringement and the vicarious infringer is in a position to benefit financially from the infringement.
Vicarious Infringement
26
These devices normally contain unauthorized movies, music or games. This is a common issue in the Air Force
Morale Drives
27
An _____ _______is presumed to have a higher standard and is not the same as “use of force” in Article 2.4; a use of force is generally seen as less than armed attack
Armed Attack
28
LOAC has two main sources: ___ ___ ___ (which arises out of the conduct of nations during hostilities and is binding upon all nations) and ___ ___ which arises from international treaties and is only binding upon those nations which have ratified a particular treaty.
customary international law, treaty law
29
List the Participants in War
Combatant (can legally fight in a war) Noncombatant (does not engage: civilians) Unlawful Combatant (cannot legally fight but does engage)
30
List the 5 principles of LOAC
The five principles are Military Necessity, Distinction, Proportionality, Humanity and Chivalry.
31
This two part definition describes Collection
Information is considered collected when Information is received by employee of Intel component in course of official duties AND there is intent to use or retain information.
32
Exceptions to Collecting Information About a U.S Person
``` Consent Publicly available Foreign intelligence Counterintelligence Potential sources of assistance to intel activities Protection of intelligence sources & methods Physical security Personnel security Communications security Narcotics Threats to safety Overhead reconnaissance Administrative purpose ```
33
Who's subject to UCMJ?
*The answer is lengthy! Think active duty, cadets, reservist, retired members, persons serving alongside, persons in custody* Article 2 of the UCMJ outlines individuals who are subject to the UCMJ. These include: 1) Members of a regular component of the armed forces, including those awaiting discharge after expiration of their terms of enlistment; volunteers from the time of their muster or acceptance into the armed forces; inductees from the time of their actual induction into the armed forces; and other persons lawfully called or ordered into, or to duty in or for training in, the armed forces, from the dates when they are required by the terms of the call or order to obey it. 2) Cadets, aviation cadets, and midshipmen. 3) Members of a reserve component while on inactive-duty training, but in the case of members of the Army National Guard or Air National Guard only when in Federal service. 4) Retired members of a regular component of the armed forces who are entitled to pay. 5) Retired members of a reserve component who are receiving hospital from an armed force. 6) Members of the Fleet Reserve and Fleet Marine Corps Reserve. 7) Persons in custody of the armed forces serving a sentence imposed by a court-martial. 8) Members of the National Oceanic and Atmospheric Administration, Public Health Service, and other organizations, when assigned to and serving with the armed forces. 9) Prisoners of war in custody of the armed forces. 10) In time of war, persons serving with or accompanying an armed force in the field. 11) Subject to any treaty or agreement to which the US is or may be a party or to any accepted rule of international law, persons serving with, employed by, or accompanying the armed forces outside the US and outside Puerto Rico, Guam, and the Virgin Islands.
34
Article ##: Jurisdiction of General Courts-Martial
Article 18 - General courts-martial also have jurisdiction to try any person who by the law of war is subject to trial by a military tribunal and may adjudge any punishment permitted by the law of war.
35
Article ##: Principals
77 Any person subject to the UCMJ who commits an offense punishable by the UCMJ, or aids, abets, counsels, commands, or procures its commission
36
Article ##: Accessory After the Fact
78 Any person who knowing that an offense has been committed, receives, comforts, or assists the offender in order to hinder or prevent his or her apprehension, trial, or punishment, is an accessory after the fact.
37
Article ##: Conspiracy
81 A person who conspires with any other person to commit an offense under the UCMJ commits the offense of conspiracy if one or more of the conspirators does an act to effect the object of the conspiracy.
38
Article (##): Failure to Obey Order or Regulation
Article 92
39
Article (###): Captured or Abandoned Property
103 A member who: fails to secure all public property taken from the enemy for the service of the United States;
40
Article (###): Aiding the Enemy
104 A member who aids, or attempts to aid, the enemy with arms, ammunition, supplies, money, intelligence, or other things;
41
Article (###): Misconduct as Prisoner
105 acting to secure favorable treatment OR maltreatment without justifiable cause
42
This article of UCMJ carries a mandatory punishment of death
Article 106 Spies
43
This article of UCMJ pertains to providing foreign entities information critical to national defense. Sometimes punishable by death
Article 106a Espionage
44
Article (###) False Official Statements
107 A member who, with intent to deceive, signs any false official document or makes any other false official statement, knowing it to be false, commits this offense.
45
Article ###: Military Property of the U.S.
108 A member who, without proper authority: sells or otherwise disposes of; willfully or through neglect damages, destroys, or loses military property of U.S
46
This article of the UCMJ is broad but applies to dishonorable or disgraceful behavior by officers
Article 133: Conduct Unbecoming an Officer
47
The most broad UCMJ article: could cover anything from bribery to kidnapping
Article 134 The General Article
48
When dealing with military members you suspect of committing any UCMJ violation, you must perform a rights advisement if:
1) You suspect the member of committing an offense; AND | 2) You intend to ask a question for which you believe the response will be incriminating
49
This list contains some points of the principles of ethics: * Public service is a public trust, requiring employees to place loyalty to the Constitution, the laws and ethical principles above private gain. * Employees shall not hold financial interests that conflict with the conscientious performance of duty. * Employees shall not engage in financial transactions using nonpublic government information or allow the improper use of such information to further any private interest. * An employee shall not solicit or accept any gift or other item of monetary value from any person or entity seeking official action from, doing business with, or conducting activities regulated by the employee's agency, or whose interests may be substantially affected by the performance or nonperformance of the employee's duties (except as specifically permitted).
Ethics are the moral framework for determining what is right or wrong. There are 14 principles of ethics. See the textbook for the complete list.
50
NTIA vs FCC
NTIA is an operating unit of the Department of Commerce and administers wireless spectrum for Federal use by Federal Agencies such as the DoD, FAA, and FBI. FCC is an independent U.S. government agency. It is charged with regulating interstate and international communications by radio, television, wire, satellite and cable