U.S. Law: U.S. Information Security Law and Regulations Flashcards
What’s Computer Fraud and Abuse Act (CFAA)?
the first major piece of US cybercrime-specific legislation
What’s Federal Sentencing Guidelines?
punishment guidelines to help federal judges interpret computer crime laws
What’s Federal Information Security Management Act (FISMA)?
formal infosec operations for federal government
What’s Children’s Online Privacy Protection Act (COPPA)? Specify the age.
- protect the online privacy of children under the age of 13
- places certain requirements on operators of websites or online services directed towards children or those with knowledge that they collect personal information from children
What’s Electronic Communication Privacy Act (ECPA)?
- governs the privacy of electronic communications
- defines the legal standards for government surveillance, access, and disclosure of electronic communications, including emails, text messages, and other forms of electronic communication
What’s Gramm-Leach-Bliley Act (GLBA)?
- U.S. federal law that governs the privacy and security of customer information held by financial institutions
- aims to ensure the confidentiality and integrity of consumers’ personal financial information
What is the key requirment when doing crimminal investigation?
- document the time, place, who was there, each step
- later, there will be a need to demonstrate what was done, whether procedures were followed
What’s Chain of Custody?
- process of maintaining the integrity, confidentiality, and availability of digital evidence in a forensically sound manner
- it is an unbroken documented record of everything done with, and by whom, during the evidence lifecycle
What does Computer and Abuse Act (CFAA) address?
unauthorized and malicious activities on federal systems
What are enforceable governmental requests?
- warrant (soudní autorizace pro policii; e.g. prohledani bytu)
- subpoena (předvolání)
- court order (soudní příkaz)
To be admissible, evidence must be what? (3)
- relevant
- material
- competent
What individuals are responsible for preserving the chain of custody of evidence?
- police investigators
- evidence technicians
- attorneys
- anyone involved in the collection, processing, analysis and production of evidence
Can crime be also violation of a regulation?
yes
What law prevents government agencies from disclosing personal information that an individual supplies to the government under protected circumstances?
Privacy Act
What federal government agency has the authority to regulate the export of encryption software?
Bureau of Industry and Security (BIS)