Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

IHP4 Task 1: Legal Analysis A1. CFAA and ECPA Identify and discuss a specific instance where information on a protected computer was accessed without authorization.

IHP4 Task 1: Legal Analysis

A1. CFAA and ECPA

Identify and discuss a specific instance where information on a protected computer was accessed without authorization. This activity constitutes criminal activity that violates the CFAA.

Identify and discuss a specific instance of unauthorized access, use, disclosure, or interception of electronic communications. This activity constitutes criminal activity that violates the ECPA.

A2. Three Laws

Identify and discuss a specific instance of negligence that facilitated the actual criminal activity you noted involving ECPA (you can use different laws if you like). Then elaborate on how the follow on actual criminal activity is justification of legal action.

Identify and discuss a specific instance of negligence that facilitated the actual criminal activity you noted involving CFAA (you can use different laws if you like). Then elaborate on how the follow on actual criminal activity is justification of legal action.

Identify and discuss a specific instance of negligence that facilitated the actual criminal activity you noted involving SOX (you can use different laws if you like). Then elaborate on how the follow on actual criminal activity is justification of legal action.

Additional clarification:Explain howthreelaws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study.Example: If a person responsible for locking a door forgets/fails to do so, and later that evening a thief entered that door and burglarized the building. The negligent action/inaction of the person who failed to lock the door allowed a criminal with no association to walk in after hours and commit the criminal act of theft. The negligence becomes a basis for the activity, but the actual crime committed is where legal action will be directed.

A3. Duty of Due Care

Identify and discuss two (2) specific examples where you observed lack of duty of due care.

A4. SOX

State why SOX is applicable to the company based on the type of company it is/type of business it conducts and discuss a specific SOX violation you observed in the case study.

B1/B1a. Criminal Evidence, Activity, Actors and Victims

Identify and discuss a specific criminal act you observed in the case study. Be sure to include (1) what the activity was, (2) what specific actor (person/group/entity) committed the activity, and (3) what specific person/group/entity was the victim of the activity.

Identify and discuss a second specific criminal act you observed in the case study. Be sure to include (1) what the activity was, (2) what specific actor (person/group/entity) committed the activity, and (3) what specific person/group/entity was the victim of the activity.

The actor, activity, and victims for your first example need to be different from those in your second example.

B1b. Cybersecurity Policies & Procedures for Criminal Activity

State and describe a specific cybersecurity policy (by name i.e. Password Lockout Policy") and accompanying procedure that could have helped prevent a specific instance of criminal activity you observed.

State and describe a second specific cybersecurity policy (by name i.e. Password Lockout Policy") and accompanying procedure that could have helped prevent a second specific instance of criminal activity you observed.

B2/B2a. Evidence of Negligent Activity, Actors and Victims

Identify and discuss a specific negligent act you observed in the case study. Be sure to include (1) what the activity was, (2) what specific actor (person/group/entity) committed the activity, and (3) what specific person/group/entity was the victim of the activity.

Identify and discuss a second specific negligent act you observed in the case study. Be sure to include (1) what the act was, (2) what specific actor (person/group/entity) committed the act, and (3) what specific person/group/entity was the victim of the activity.

The actor, activity, and victims for your first example need to be different from those in your second example.

B2b. Cybersecurity Policies & procedures for Negligent Activity

State and describe a specific cybersecurity policy (by name i.e. Password Lockout Policy") and accompanying procedure that could have helped prevent a specific instance of negligent activity you observed.

State and describe a second specific cybersecurity policy (by name i.e. Password Lockout Policy") and accompanying procedure that could have helped prevent a second specific instance of negligent activity you observed.

C. Legal Compliance Summary for Management

Succinctly recap the compliance status (actually state "compliant" or "not compliant") of each law discussed in parts A and B above. Discuss contributing factors for each law. Provide a paragraph or two to complete this section.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Business Law Text and Cases

Authors: Kenneth W. Clarkson, Roger LeRoy Miller, Gaylord A. Jentz, F

11th Edition

324655223, 978-0324655223

More Books

Students also viewed these Law questions