Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Area Act Date Description Telecommunications Telecommunications Deregulation and Competition Act of 1996an update to Communications Act of 1934 (47 USC 151 et seq.) 1934 Regulates

Area

Act

Date

Description

Telecommunications

Telecommunications Deregulation and Competition Act of 1996an update to Communications Act of 1934 (47 USC 151 et seq.)

1934

Regulates interstate and foreign telecommunications (amended in 1996 and 2001)

Civil legal evidence

Federal Rules for Civil Procedure (FRCP)

1938

As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings

Freedom of information

Freedom of Information Act (FOIA)

1966

Allows for disclosure of previously unreleased information and documents controlled by the U.S. government

Privacy

Federal Privacy Act of 1974

1974

Governs federal agency use of personal information

Copyright

Copyright Act of 1976an update to U.S. Copyright Law (17 USC)

1976

Protects intellectual property, including publications and software

Cryptography

Electronic Communications Privacy Act of 1986 (Update to 18 USC)

1986

Regulates interception and disclosure of electronic information; also referred to as the Federal Wiretapping Act

Access to stored communications

Unlawful Access to Stored Communications (18 USC 2701)

1986

Provides penalties for illegally accessing communications (such as e-mail and voicemail) stored by a service provider

Threats to computers

Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)

1986

Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)

Federal agency information security

Computer Security Act of 1987

1987

Requires all federal computer systems that contain classified information to have security plans in place, and requires periodic security training for all people who operate, design, or manage such systems

Trap and trace restrictions

General prohibition on pen register and trap and trace device use; exception (18 USC 3121 et seq.)

1993

Prohibits the use of electronic pen registers and trap and trace devices without a court order

Criminal intent

National Information Infrastructure Protection Act of 1996 (update to 18 USC 1030)

1996

Categorizes crimes based on criminal intent and a defendant's authority to access a protected computer system

Trade secrets

Economic Espionage Act of 1996

1996

Prevents abuse of information gained while employed elsewhere

Personal health information protection

Health Insurance Portability and Accountability Act of 1996 (HIPAA)

1996

Requires medical practices to ensure the privacy of personal medical information

Intellectual property

No Electronic Theft Act amends 17 USC 506(a)copyright infringement, and 18 USC 2319criminal (Public Law 105-147) infringement of copyright

1997

Amends copyright and criminal statutes to provide greater copyright protection and penalties for electronic copyright infringement

Copy protection

Digital Millennium Copyright Act (update to 17 USC 101)

1998

Provides specific penalties for removing copyright protection from media

Identity theft

Identity Theft and Assumption Deterrence Act of 1998 (18 USC 1028)

1998

Attempts to instigate penalties for identity theft by recognizing people who lose their identity as the true victims, not just the commercial and financial credit entities that suffered losses

Children's privacy

Children's Online Privacy Protection Act of 1998 (COPPA)

1998

Protects children online by requiring Web sites with users under the age of 13 to post privacy policies that specify clear guidance and restrictions on information collection

Encryption and digital signatures

Security and Freedom Through Encryption Act of 1999

1999

Affirms the rights of people in the United States to use and sell products that include encryption and to relax export controls on such products

Banking

Gramm-Leach-Bliley Act of 1999 (GLB) or the Financial Services Modernization Act

1999

Repeals the restrictions on banks affiliating with insurance and securities firms; has significant impact on the privacy of personal information used by these industries

Children's online protection

Children's Internet Protection Act

2000

Requires K-12 schools and libraries to use Internet filters to protect children online

Terrorism

USA PATRIOT Act of 2001 (update to 18 USC 1030)

2001

Defines stiffer penalties for prosecution of terrorist crimes

Accountability

Sarbanes-Oxley Act of 2002 (SOX) or Public Company Accounting Reform and Investor Protection Act

2002

Enforces accountability for executives at publicly traded companies; this law has created ripple effects throughout the accounting, IT, and related units of many organizations

Federal information security

Federal Information Security Management Act (FISMA)

2002

Specifies the requirement for federal agencies to establish information security programs to protect their information assets

Spam

Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 CAN-SPAM Act (15 USC 7701 et seq.)

2003

Sets the first national standards for regulating the distribution of commercial e-mail, including mobile phone spam

Fraud with access devices

Fraud and Related Activity in Connection with Access Devices (18 USC 1029)

2004

Defines and formalizes law to counter threats from counterfeit access devices such as ID cards, credit cards, telecom equipment, mobile or electronic serial numbers, and the equipment that creates them

Terrorism

Customs-Trade Partnership Against Terrorism (C-TPAT)

2004

Organizations that conduct international business may voluntarily comply with this initiative by U.S. Customs and Border Protection to facilitate security and shipments processing

Terrorism and extreme drug trafficking

USA PATRIOT Improvement and Reauthorization Act of 2005 (update to 18 USC 1030)

2006

Renews critical sections of the USA PATRIOT Act

Identity theft

Identity Theft Enforcement and Restitution Act

2008

Imposes criminal liability on people who commit identity theft, but does not regulate the technology

Terrorism

PATRIOT Sunsets Extension Act of 2011 (update to 18 USC 1030)

2011

Renews critical sections of the USA PATRIOT Act

Principles of Information Security, state the overall intent of each law. For example, what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do? Just pick two if u dont won't all of them.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Optimization And Data Science Trends And Applications 5th Airoyoung Workshop And Airo Phd School 2021 Joint Event

Authors: Adriano Masone ,Veronica Dal Sasso ,Valentina Morandi

1st Edition

3030862887, 978-3030862886

More Books

Students also viewed these Databases questions

Question

Explain methods of metal extraction with examples.

Answered: 1 week ago