Chapter 9 - Legal Compliance Flashcards
Computer targeted crime
A computer was the target
Computer assisted crime
When a computer is used as a tool to commit the crime
Computer is incidental
A computer is used towards the crime but not for the crime, like storing discovered lotto ticket numbers
Zombie, bots, and a botnet oh my
Zombie - a compromised computer
Bots - the software
Botnet - the collection of compromised computers
Advanced persistent threat APT
Advanced - highly knowledgable and understanding of the environment
Persistent - will wait for the perfect moment and stake a foothold
CoE convention on cybercrime
First true attempt at making internationally accepted cybercrime policies
OECD
Cross border policy companies that transfer data across borders should be aware of
EU principles on privacy
A directive on how private data should be handled internationally
EU data protection directive
All EU union companies must abide by the data protection laws put into place
Safe harbor
A set of stopgap policies to make non EU companies in compliance with EU standards more quickly
Wassenaar agreement
Exportation restrictions including technology - these are restricted by good and bad countries and some countries have import restrictions like big brother countries who don’t want people to have cryptography
Tort law
This is a civil law in the common law system, ie crime against a business or a person financially .. Jury judges on liability
What are the law systems of the world?
Common - US/UK Civil - Most of Europe Religious - Muslim Customary - How it has always been Mixed - various systems based on local
Criminal law
Murder kidnapping etc, judged based on guilt
Regulatory law
Building codes and other administrative policies
Intellectual property law
Copyright and trademark laws
Trade secret
A profitable secret idea or recipe of ideas that could damage a company if leaked
Copyright
Protects the expression of an idea, like a painting or programming code
Trademark
This is a brand or slogan
Patent
This is claiming an invention for a certain number of years before being public domain
Software protection association
A group of major companies working together against piracy
FAST
London based federation against software theft
Digital millennium copyright act
Law that makes it federally illegal to create products or methods that circumvent copyright mechanisms
Generic approach to privacy
Horizontal enactment rules that stretch across all industry bounderies
Regulation by industry approach to privacy
Specific sector enacted privacy like healthcare
PII
Personally identifiable information - this is what people want to keep private and unique
SOX
Uses COSO model for compliance and helps keep companies honest
HIPAA
Health information privacy act used to secure your PID - violations are extremely steep
HITECH act
An added protection for HIPAA rules govern in the civil and criminal sector
GLBA
Gramm-Leach-Bliley act enforces financial institutions to develop privacy notices and options for information sharing
This is not just banks
Computer fraud and abuse act
Written in 1986 and amended several times after .. Most recently in 2008
.. Protects against knowingly accessing a computer without authorization to or the distribution of malicious code