Area Act Date Description Telecommunications Telecommunications Deregulation and
ID: 3905384 • Letter: A
Question
Area
Act
Date
Description
Telecommunications
Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.)
1934
Regulates interstate and foreign telecommunications (amended in 1996 and 2001)
Civil legal evidence
Federal Rules for Civil Procedure (FRCP)
1938
As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings
Freedom of information
Freedom of Information Act (FOIA)
1966
Allows for disclosure of previously unreleased information and documents controlled by the U.S. government
Privacy
Federal Privacy Act of 1974
1974
Governs federal agency use of personal information
Copyright
Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)
1976
Protects intellectual property, including publications and software
Cryptography
Electronic Communications Privacy Act of 1986 (Update to 18 USC)
1986
Regulates interception and disclosure of electronic information; also referred to as the Federal Wiretapping Act
Access to stored communications
Unlawful Access to Stored Communications (18 USC 2701)
1986
Provides penalties for illegally accessing communications (such as e-mail and voicemail) stored by a service provider
Threats to computers
Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)
1986
Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)
Federal agency information security
Computer Security Act of 1987
1987
Requires all federal computer systems that contain classified information to have security plans in place, and requires periodic security training for all people who operate, design, or manage such systems
Trap and trace restrictions
General prohibition on pen register and trap and trace device use; exception (18 USC 3121 et seq.)
1993
Prohibits the use of electronic pen registers and trap and trace devices without a court order
Criminal intent
National Information Infrastructure Protection Act of 1996 (update to 18 USC 1030)
1996
Categorizes crimes based on criminal intent and a defendant's authority to access a protected computer system
Trade secrets
Economic Espionage Act of 1996
1996
Prevents abuse of information gained while employed elsewhere
Personal health information protection
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
1996
Requires medical practices to ensure the privacy of personal medical information
Intellectual property
No Electronic Theft Act amends 17 USC 506(a)—copyright infringement, and 18 USC 2319—criminal (Public Law 105-147) infringement of copyright
1997
Amends copyright and criminal statutes to provide greater copyright protection and penalties for electronic copyright infringement
Copy protection
Digital Millennium Copyright Act (update to 17 USC 101)
1998
Provides specific penalties for removing copyright protection from media
Identity theft
Identity Theft and Assumption Deterrence Act of 1998 (18 USC 1028)
1998
Attempts to instigate penalties for identity theft by recognizing people who lose their identity as the true victims, not just the commercial and financial credit entities that suffered losses
Children's privacy
Children's Online Privacy Protection Act of 1998 (COPPA)
1998
Protects children online by requiring Web sites with users under the age of 13 to post privacy policies that specify clear guidance and restrictions on information collection
Encryption and digital signatures
Security and Freedom Through Encryption Act of 1999
1999
Affirms the rights of people in the United States to use and sell products that include encryption and to relax export controls on such products
Banking
Gramm-Leach-Bliley Act of 1999 (GLB) or the Financial Services Modernization Act
1999
Repeals the restrictions on banks affiliating with insurance and securities firms; has significant impact on the privacy of personal information used by these industries
Children's online protection
Children's Internet Protection Act
2000
Requires K-12 schools and libraries to use Internet filters to protect children online
Terrorism
USA PATRIOT Act of 2001 (update to 18 USC 1030)
2001
Defines stiffer penalties for prosecution of terrorist crimes
Accountability
Sarbanes-Oxley Act of 2002 (SOX) or Public Company Accounting Reform and Investor Protection Act
2002
Enforces accountability for executives at publicly traded companies; this law has created ripple effects throughout the accounting, IT, and related units of many organizations
Federal information security
Federal Information Security Management Act (FISMA)
2002
Specifies the requirement for federal agencies to establish information security programs to protect their information assets
Spam
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 CAN-SPAM Act (15 USC 7701 et seq.)
2003
Sets the first national standards for regulating the distribution of commercial e-mail, including mobile phone spam
Fraud with access devices
Fraud and Related Activity in Connection with Access Devices (18 USC 1029)
2004
Defines and formalizes law to counter threats from counterfeit access devices such as ID cards, credit cards, telecom equipment, mobile or electronic serial numbers, and the equipment that creates them
Terrorism
Customs-Trade Partnership Against Terrorism (C-TPAT)
2004
Organizations that conduct international business may voluntarily comply with this initiative by U.S. Customs and Border Protection to facilitate security and shipments processing
Terrorism and extreme drug trafficking
USA PATRIOT Improvement and Reauthorization Act of 2005 (update to 18 USC 1030)
2006
Renews critical sections of the USA PATRIOT Act
Identity theft
Identity Theft Enforcement and Restitution Act
2008
Imposes criminal liability on people who commit identity theft, but does not regulate the technology
Terrorism
PATRIOT Sunsets Extension Act of 2011 (update to 18 USC 1030)
2011
Renews critical sections of the USA PATRIOT Act
Principles of Information Security, state the overall intent of each law. For example, what do the U.S. Police and Justice Act and the Computer Fraud and Abuse Act of the U.K. do? Just pick two if u dont won't all of them.
Area
Act
Date
Description
Telecommunications
Telecommunications Deregulation and Competition Act of 1996—an update to Communications Act of 1934 (47 USC 151 et seq.)
1934
Regulates interstate and foreign telecommunications (amended in 1996 and 2001)
Civil legal evidence
Federal Rules for Civil Procedure (FRCP)
1938
As updated in 2006, specifies requirements for the storage, protection, and surrender of discoverable electronic data as used in federal civil proceedings
Freedom of information
Freedom of Information Act (FOIA)
1966
Allows for disclosure of previously unreleased information and documents controlled by the U.S. government
Privacy
Federal Privacy Act of 1974
1974
Governs federal agency use of personal information
Copyright
Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)
1976
Protects intellectual property, including publications and software
Cryptography
Electronic Communications Privacy Act of 1986 (Update to 18 USC)
1986
Regulates interception and disclosure of electronic information; also referred to as the Federal Wiretapping Act
Access to stored communications
Unlawful Access to Stored Communications (18 USC 2701)
1986
Provides penalties for illegally accessing communications (such as e-mail and voicemail) stored by a service provider
Threats to computers
Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)
1986
Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)
Federal agency information security
Computer Security Act of 1987
1987
Requires all federal computer systems that contain classified information to have security plans in place, and requires periodic security training for all people who operate, design, or manage such systems
Trap and trace restrictions
General prohibition on pen register and trap and trace device use; exception (18 USC 3121 et seq.)
1993
Prohibits the use of electronic pen registers and trap and trace devices without a court order
Criminal intent
National Information Infrastructure Protection Act of 1996 (update to 18 USC 1030)
1996
Categorizes crimes based on criminal intent and a defendant's authority to access a protected computer system
Trade secrets
Economic Espionage Act of 1996
1996
Prevents abuse of information gained while employed elsewhere
Personal health information protection
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
1996
Requires medical practices to ensure the privacy of personal medical information
Intellectual property
No Electronic Theft Act amends 17 USC 506(a)—copyright infringement, and 18 USC 2319—criminal (Public Law 105-147) infringement of copyright
1997
Amends copyright and criminal statutes to provide greater copyright protection and penalties for electronic copyright infringement
Copy protection
Digital Millennium Copyright Act (update to 17 USC 101)
1998
Provides specific penalties for removing copyright protection from media
Identity theft
Identity Theft and Assumption Deterrence Act of 1998 (18 USC 1028)
1998
Attempts to instigate penalties for identity theft by recognizing people who lose their identity as the true victims, not just the commercial and financial credit entities that suffered losses
Children's privacy
Children's Online Privacy Protection Act of 1998 (COPPA)
1998
Protects children online by requiring Web sites with users under the age of 13 to post privacy policies that specify clear guidance and restrictions on information collection
Encryption and digital signatures
Security and Freedom Through Encryption Act of 1999
1999
Affirms the rights of people in the United States to use and sell products that include encryption and to relax export controls on such products
Banking
Gramm-Leach-Bliley Act of 1999 (GLB) or the Financial Services Modernization Act
1999
Repeals the restrictions on banks affiliating with insurance and securities firms; has significant impact on the privacy of personal information used by these industries
Children's online protection
Children's Internet Protection Act
2000
Requires K-12 schools and libraries to use Internet filters to protect children online
Terrorism
USA PATRIOT Act of 2001 (update to 18 USC 1030)
2001
Defines stiffer penalties for prosecution of terrorist crimes
Accountability
Sarbanes-Oxley Act of 2002 (SOX) or Public Company Accounting Reform and Investor Protection Act
2002
Enforces accountability for executives at publicly traded companies; this law has created ripple effects throughout the accounting, IT, and related units of many organizations
Federal information security
Federal Information Security Management Act (FISMA)
2002
Specifies the requirement for federal agencies to establish information security programs to protect their information assets
Spam
Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 CAN-SPAM Act (15 USC 7701 et seq.)
2003
Sets the first national standards for regulating the distribution of commercial e-mail, including mobile phone spam
Fraud with access devices
Fraud and Related Activity in Connection with Access Devices (18 USC 1029)
2004
Defines and formalizes law to counter threats from counterfeit access devices such as ID cards, credit cards, telecom equipment, mobile or electronic serial numbers, and the equipment that creates them
Terrorism
Customs-Trade Partnership Against Terrorism (C-TPAT)
2004
Organizations that conduct international business may voluntarily comply with this initiative by U.S. Customs and Border Protection to facilitate security and shipments processing
Terrorism and extreme drug trafficking
USA PATRIOT Improvement and Reauthorization Act of 2005 (update to 18 USC 1030)
2006
Renews critical sections of the USA PATRIOT Act
Identity theft
Identity Theft Enforcement and Restitution Act
2008
Imposes criminal liability on people who commit identity theft, but does not regulate the technology
Terrorism
PATRIOT Sunsets Extension Act of 2011 (update to 18 USC 1030)
2011
Renews critical sections of the USA PATRIOT Act
Explanation / Answer
Answer)
Explaining the two laws:
Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)
-- Protects intellectual property, including publications and software
Copyright Act of 1976 is a US law which the primary copyright law in the country. The Act was public in 1976 and came in effect on January 1, 1978. Also, the act protects the copyright laws of the intellectual property such as publications, software and others and lists the rights to the copyright holders. Copyright protection was given to any tangible medium of expression which can be perceived and communicated to another by any means containing music works, drama, sound recording, graphic works and many other categories.
Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)
-- Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)
The Computer Fraud and Abuse Act is a US cyber security law which is used to counter threats in computer-related terms and offenses and prohibits the use of the computer without correct authorization and illegal use of the computer to provide harm and stealing information. The Computer Fraud and Abuse Act protects when users have knowingly accessed computers having computer without authorization or exceeding their level of authorization. Also, thereby if the user obtains any specific or confidential information from the computer. Damages to the computers with intent of fraud and stealing information. Defrauding computer traffic to and from a computer. Extortion of money and others causing threat to any users. The Computer Fraud and Abuse Act protects all frauds and abuses regarding the computers as a criminal law and a statute which allows the individuals to sue the attackers or damages money to recover the money from the damages.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.