Create an account
created by combining pieces of non-private data—often
collected during software updates, and via cookies—that when combined may violate privacy.
Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS):
created by the World Trade Organization (WTO) and negotiated over the years 1986-
1994, introduced intellectual property rules into the multilateral trade system.
Association of Computing Machinery (ACM
(www.acm.org); a respected
professional society that was established in 1947 as ―the world's first educational and
scientific computing society.‖
comprises a wide variety of laws that govern a nation or state and deal with
the relationships and conflicts between organizational entities and people
Computer Fraud and Abuse Act of 1986 (CFA Act):
the cornerstone of many
computer-related federal laws and enforcement efforts.
Computer Security Act of 1987:
was one of the first attempts to protect federal
computer systems by establishing minimum acceptable security practices.
addresses activities and conduct harmful to society, and is actively
enforced by the state.
Department of Homeland Security (DHS):
made up of five directorates, or divisions,through which it carries out its mission of protecting the people as well as the physical and informational assets of the United States.
Digital Millennium Copyright Act (DMCA):
the American contribution to an
international effort by the World Intellectual Properties Organization (WIPO) to reduce the impact of copyright, trademark, and privacy infringement, especially when
accomplished via the removal of technological copyright protection measures.
when an organization makes sure that every employee knows what is
acceptable or unacceptable behavior, and knows the consequences of illegal or unethical
requires that an organization make a valid effort to protect others and
continually maintains this level of effort.
Electronic Communications Privacy Act of 1986
a collection of statutes that
regulates the interception of wire, electronic, and oral communications.
Federal Privacy Act of 1974
regulates government agencies and holds them accountable if they release private information about individuals or businesses without permission.
Financial Services Modernization Act or Gramm-Leach-Bliley Act of 1999:
contains a number of provisions focusing on facilitating affiliation among banks,
securities firms, and insurance companies
Fraud and Related Activity in Connection with Identification Documents,Authentication Features, and Information (Title 18, U.S.C. § 1028)
criminalizes creation, reproduction, transfer, possession, or use of unauthorized or false identification documents or document-making equipment.
Freedom of Information Act:
allows any person to request access to federal agency
records or information not determined to be a matter of national security.
Georgia Computer Systems Protection Act
seeks to protect information, and which establishes penalties for the use of information technology to attack or exploit information systems.
Health Insurance Portability and Accountability Act Of 1996 (HIPAA)
as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
Information Systems Audit and Control Association (ISACA)
professional association that focuses on auditing, control, and security.
Information Systems Security Association (ISSA)
(www.issa.org); a nonprofit
society of information security professionals.
International Information Systems Security Certification Consortium, Inc. (ISC)2
(www. isc2.org); a nonprofit organization that focuses on the development and implementation of information security certifications and credentials.
that is, the court's right to hear a case if a wrong is committed in its
territory or involves its citizenry
Long arm jurisdiction
the long arm of the law extending across the country or around
the world to draw an accused individual into its court systems
National Information Infrastructure Protection Act of 1996
sections of the previous act and increased the penalties for selected crimes
National InfraGard Program
began as a cooperative effort between the FBI's
Cleveland Field Office and local technology professionals.
Privacy of Customer Information Section
of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not
for any marketing purposes, and that carriers cannot disclose this information except when necessary to provide their services.
encompasses family law, commercial law, and labor law, and regulates the relationship between individuals and organizations
regulates the structure and administration of government agencies and their
relationships with citizens, employees, and other governments
Security and Freedom through Encryption Act of 1999
provides guidance on the
use of encryption and provides protection from government intervention
System Administration, Networking, and Security Institute (SANS)
(www.sans.org); founded in 1989, is a professional research and education cooperative
organization with a current membership of more than 156,000 security professionals,
auditors, system administrators, and network administrators.
U.S. Secret Service
an agency within the Department of the Treasury; provides protective services for key members of the U.S. government; charged with the detection and arrest of any person committing a United States federal offense relating to computer fraud and false identification crimes
USA PATRIOT Act of 2001
provides law enforcement agencies with broader latitude in order to combat terrorism-related activities
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together