Question

Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...

Area

Act

Date

Description

Telecommunications

Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.)

1934

Regulates interstate and foreign telecommunications (amended in 1996 and 2001)

Civil legal evidence

Federal Rules for Civil Procedure (FRCP)

1938

As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings

Freedom of information

Freedom of Information Act (FOIA)

1966

Allows for disclosure of previously unreleased information and documents controlled by the U.S. government

Privacy

Federal Privacy Act of 1974

1974

Governs federal agency use of personal information

Copyright

Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)

1976

Protects intellectual property, including publications and software

Cryptography

Electronic Communications Privacy Act of 1986 (Update to 18 USC)

1986

Regulates interception and disclosure of electronic information; also referred to as the Federal Wiretapping Act

Access to stored communications

Unlawful Access to Stored Communications (18 USC 2701)

1986

Provides penalties for illegally accessing communications (such as e-mail and voicemail) stored by a service provider

Threats to computers

Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)

1986

Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)

Federal agency information security

Computer Security Act of 1987

1987

Requires all federal computer systems that contain classified information to have security plans in place, and requires periodic security training for all people who operate, design, or manage such systems

Trap and trace restrictions

General prohibition on pen register and trap and trace device use; exception (18 USC 3121 et seq.)

1993

Prohibits the use of electronic pen registers and trap and trace devices without a court order

Criminal intent

National Information Infrastructure Protection Act of 1996 (update to 18 USC 1030)

1996

Categorizes crimes based on criminal intent and a defendant's authority to access a protected computer system

Trade secrets

Economic Espionage Act of 1996

1996

Prevents abuse of information gained while employed elsewhere

Personal health information protection

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

1996

Requires medical practices to ensure the privacy of personal medical information

Intellectual property

No Electronic Theft Act amends 17 USC 506(a)—copyright infringement, and 18 USC 2319—criminal (Public Law 105-147) infringement of copyright

1997

Amends copyright and criminal statutes to provide greater copyright protection and penalties for electronic copyright infringement

Copy protection

Digital Millennium Copyright Act (update to 17 USC 101)

1998

Provides specific penalties for removing copyright protection from media

Identity theft

Identity Theft and Assumption Deterrence Act of 1998 (18 USC 1028)

1998

Attempts to instigate penalties for identity theft by recognizing people who lose their identity as the true victims, not just the commercial and financial credit entities that suffered losses

Children's privacy

Children's Online Privacy Protection Act of 1998 (COPPA)

1998

Protects children online by requiring Web sites with users under the age of 13 to post privacy policies that specify clear guidance and restrictions on information collection

Encryption and digital signatures

Security and Freedom Through Encryption Act of 1999

1999

Affirms the rights of people in the United States to use and sell products that include encryption and to relax export controls on such products

Banking

Gramm-Leach-Bliley Act of 1999 (GLB) or the Financial Services Modernization Act

1999

Repeals the restrictions on banks affiliating with insurance and securities firms; has significant impact on the privacy of personal information used by these industries

Children's online protection

Children's Internet Protection Act

2000

Requires K-12 schools and libraries to use Internet filters to protect children online

Terrorism

USA PATRIOT Act of 2001 (update to 18 USC 1030)

2001

Defines stiffer penalties for prosecution of terrorist crimes

Accountability

Sarbanes-Oxley Act of 2002 (SOX) or Public Company Accounting Reform and Investor Protection Act

2002

Enforces accountability for executives at publicly traded companies; this law has created ripple effects throughout the accounting, IT, and related units of many organizations

Federal information security

Federal Information Security Management Act (FISMA)

2002

Specifies the requirement for federal agencies to establish information security programs to protect their information assets

Spam

Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 CAN-SPAM Act (15 USC 7701 et seq.)

2003

Sets the first national standards for regulating the distribution of commercial e-mail, including mobile phone spam

Fraud with access devices

Fraud and Related Activity in Connection with Access Devices (18 USC 1029)

2004

Defines and formalizes law to counter threats from counterfeit access devices such as ID cards, credit cards, telecom equipment, mobile or electronic serial numbers, and the equipment that creates them

Terrorism

Customs-Trade Partnership Against Terrorism (C-TPAT)

2004

Organizations that conduct international business may voluntarily comply with this initiative by U.S. Customs and Border Protection to facilitate security and shipments processing

Terrorism and extreme drug trafficking

USA PATRIOT Improvement and Reauthorization Act of 2005 (update to 18 USC 1030)

2006

Renews critical sections of the USA PATRIOT Act

Identity theft

Identity Theft Enforcement and Restitution Act

2008

Imposes criminal liability on people who commit identity theft, but does not regulate the technology

Terrorism

PATRIOT Sunsets Extension Act of 2011 (update to 18 USC 1030)

2011

Renews critical sections of the USA PATRIOT Act

Principles of Information Security, state the overall intent of each law. For example, what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do? Just pick two if u dont won't all of them.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer)

Explaining the two laws:

Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)

-- Protects intellectual property, including publications and software

Copyright Act of 1976 is a US law which the primary copyright law in the country. The Act was public in 1976 and came in effect on January 1, 1978. Also, the act protects the copyright laws of the intellectual property such as publications, software and others and lists the rights to the copyright holders. Copyright protection was given to any tangible medium of expression which can be perceived and communicated to another by any means containing music works, drama, sound recording, graphic works and many other categories.

Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)

-- Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)

The Computer Fraud and Abuse Act is a US cyber security law which is used to counter threats in computer-related terms and offenses and prohibits the use of the computer without correct authorization and illegal use of the computer to provide harm and stealing information. The Computer Fraud and Abuse Act protects when users have knowingly accessed computers having computer without authorization or exceeding their level of authorization. Also, thereby if the user obtains any specific or confidential information from the computer. Damages to the computers with intent of fraud and stealing information. Defrauding computer traffic to and from a computer. Extortion of money and others causing threat to any users. The Computer Fraud and Abuse Act protects all frauds and abuses regarding the computers as a criminal law and a statute which allows the individuals to sue the attackers or damages money to recover the money from the damages.

Add a comment
Know the answer?
Add Answer to:
Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Hello, Need my paper proof read, I have problems with my paper structure. I need help...

    Hello, Need my paper proof read, I have problems with my paper structure. I need help with my flow as I feel as if my analysis is not iter mixing with the my paper. For example currently I have citation, citation, example, then my analysis. I need help restructure my paper for better flow. I have copied and pasted my paper for review below: Smart home devices have been a growing trend in the Canadian market with approximately 18% of...

  • CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a...

    CASE 20 Enron: Not Accounting for the Future* INTRODUCTION Once upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant "E" slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm...

  • Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming...

    Case: Enron: Questionable Accounting Leads to CollapseIntroductionOnce upon a time, there was a gleaming office tower in Houston, Texas. In front of that gleaming tower was a giant “E,” slowly revolving, flashing in the hot Texas sun. But in 2001, the Enron Corporation, which once ranked among the top Fortune 500 companies, would collapse under a mountain of debt that had been concealed through a complex scheme of off-balance-sheet partnerships. Forced to declare bankruptcy, the energy firm laid off 4,000...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT