Lecture 12 Flashcards
Legal & Ethical issues
Laws that keep society safe.
A. Criminal
B. Civil
C. Administrative
A. Criminal
Laws designed to provide for an orderly society. Authorities do not get involved.
A. Criminal
B. Civil
C. Administrative
B. Civil
Laws enacted as policies, procedures and regulations that govern the daily operations of the agency. Published by Code of Federal Regulations (CFR).
A. Criminal
B. Civil
C. Administrative
C. Administrative
Access classified or financial info without authorizations.
Access computer used by federal government.
Use federal computer to perpetrate a fraud.
What law covers the above?
A. Computer Security Action of 1987 (CSA)
B. Computer Fraud and Abuse Act of 1984 (CFAA)
C. Government Information Security Reform Act of 2000
B. Computer Fraud and Abuse Act of 1984 (CFAA)
Amendments to the CFAA in 1994 include what?
Creation of any type of malicious code that might cause damage to a computer system
Covers interstate transactions
Imprisonment of offenders
victim can pursue civil action for compensation
What law mandates the baseline security requirements for all federal agencies?
A. Computer Security Action of 1987 (CSA)
B. Computer Fraud and Abuse Act of 1984 (CFAA)
C. Government Information Security Reform Act of 2000
A. Computer Security Action of 1987 (CSA)
This law amends the United States Code to provide framework for establishing effective controls over IT resources, define security management measures, provides government-wide management and oversight of IT security risks. Defines mission-critical systems.
A. Computer Security Action of 1987 (CSA)
B. Computer Fraud and Abuse Act of 1984 (CFAA)
C. Government Information Security Reform Act of 2000
C. Government Information Security Reform Act of 2000
_____ are the intangible assets such as copyrights, trademarks,patents,trade secrets.
intellectual property
_____ law protects against unauthorized duplication of an owners original work.
copyright
The ________ prohibits attempts to circumvent copyright protection mechanisms and limits the liability of ISP when their facilities are used by criminals violating copyright laws.
Digital Millennium copyright act (DMCA)
A ______ is used to identify a company and its products/services. Such as slogans and logos.
trademark
_____ protect the intellectual property rights of inventors.
patents
_____ are processes or other info a company wants to keep secret. (ingredients, blue prints, business plans, etc.)
trade secrets
The _____ has 2 major provisions: if found guilty of stealing trade secrets from a US corp. w/intention of benefiting a foreign government may be fined up to $500,000 and imprisoned up to 15 years, and other circumstances fined up to $250,000 and imprisoned up to 10 years.
Economic Espionage Act of 1996
What are the 3 types of license agreements?
Contractual - written contract between vendor & customer
Shrink wrap- written on outside of package
Click wrap- click a button to agree