• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
policies
Guidelines that describe acceptable and unacceptable employee behaviors in the workplace.
Criminal law
addresses activities and conduct harmful to society.
Private Law
encompasses family law, commercial law, labor law, and regulates the relationship between individuals and organizations.
Public Law
regulates the stricture and administration of government agencies and their relationship with citizens, employees, and other governments.
Computer Fraud and Abuse Act (1986)
cornerstone of many computer related federal laws and enforcement efforts.
USA PATRIOT Act (2001)
provides law enforcement agencies with broad latitude in order to combat terrorism related activities.
Computer Security Act (1987)
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices.
Privacy of Customer Information Sector (common carrier)
Any propriety information shall be used explicitly for providing services and not for any marketing purposes and that carriers cannot disclose this information except when necessary to provide their services.
Federal Privacy Act 1974
Regulates government agencies and holds them accountable if they release private information about individuals or businesses without permission.
HIPPA
Protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
Financial Services Modernization Act/Gramm-Leach-Bliley Act (1999)
Requires all financial institutions to disclose their privacy policies on the sharing of nonpublic personal information/due notices to customers if their information will be shared.
Fraud and Related Activities in Connection with Identification Documents, Authentication Features and Information.
Criminalized creation reproduction transfer possession or use of unauthorized of false identification documents or document making equipment.
Economic Espionage Act (1996)
Attempts to prevent trade secrets from being illegally shared.
Security and Freedom through Encryption Act (1999)
provides guidelines on the use of encryption and provides protection from government intervention.
Freedom of Information Act
allows any person to request access to federal agency records or information not determined to be a matter of national security.
Department of Homeland Security (2003)
made up of five directories or divisions thought which Carrie out its mission of protecting the people as well as physical and informational assets of the united states.
U.S Secret Service
agency within the department of the treasury. protects key members of the u.s government. detects and arrests people committing a us federal offense relating to computer fraud and false identification crimes.