Chapter 9 - Legal Compliance Flashcards
(79 cards)
Computer targeted crime
A computer was the target
Computer assisted crime
When a computer is used as a tool to commit the crime
Computer is incidental
A computer is used towards the crime but not for the crime, like storing discovered lotto ticket numbers
Zombie, bots, and a botnet oh my
Zombie - a compromised computer
Bots - the software
Botnet - the collection of compromised computers
Advanced persistent threat APT
Advanced - highly knowledgable and understanding of the environment
Persistent - will wait for the perfect moment and stake a foothold
CoE convention on cybercrime
First true attempt at making internationally accepted cybercrime policies
OECD
Cross border policy companies that transfer data across borders should be aware of
EU principles on privacy
A directive on how private data should be handled internationally
EU data protection directive
All EU union companies must abide by the data protection laws put into place
Safe harbor
A set of stopgap policies to make non EU companies in compliance with EU standards more quickly
Wassenaar agreement
Exportation restrictions including technology - these are restricted by good and bad countries and some countries have import restrictions like big brother countries who don’t want people to have cryptography
Tort law
This is a civil law in the common law system, ie crime against a business or a person financially .. Jury judges on liability
What are the law systems of the world?
Common - US/UK Civil - Most of Europe Religious - Muslim Customary - How it has always been Mixed - various systems based on local
Criminal law
Murder kidnapping etc, judged based on guilt
Regulatory law
Building codes and other administrative policies
Intellectual property law
Copyright and trademark laws
Trade secret
A profitable secret idea or recipe of ideas that could damage a company if leaked
Copyright
Protects the expression of an idea, like a painting or programming code
Trademark
This is a brand or slogan
Patent
This is claiming an invention for a certain number of years before being public domain
Software protection association
A group of major companies working together against piracy
FAST
London based federation against software theft
Digital millennium copyright act
Law that makes it federally illegal to create products or methods that circumvent copyright mechanisms
Generic approach to privacy
Horizontal enactment rules that stretch across all industry bounderies