Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
policies
|
Guidelines that describe acceptable and unacceptable employee behaviors in the workplace.
|
|
Criminal law
|
addresses activities and conduct harmful to society.
|
|
Private Law
|
encompasses family law, commercial law, labor law, and regulates the relationship between individuals and organizations.
|
|
Public Law
|
regulates the stricture and administration of government agencies and their relationship with citizens, employees, and other governments.
|
|
Computer Fraud and Abuse Act (1986)
|
cornerstone of many computer related federal laws and enforcement efforts.
|
|
USA PATRIOT Act (2001)
|
provides law enforcement agencies with broad latitude in order to combat terrorism related activities.
|
|
Computer Security Act (1987)
|
one of the first attempts to protect federal computer systems by establishing minimum acceptable security practices.
|
|
Privacy of Customer Information Sector (common carrier)
|
Any propriety information shall be used explicitly for providing services and not for any marketing purposes and that carriers cannot disclose this information except when necessary to provide their services.
|
|
Federal Privacy Act 1974
|
Regulates government agencies and holds them accountable if they release private information about individuals or businesses without permission.
|
|
HIPPA
|
Protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.
|
|
Financial Services Modernization Act/Gramm-Leach-Bliley Act (1999)
|
Requires all financial institutions to disclose their privacy policies on the sharing of nonpublic personal information/due notices to customers if their information will be shared.
|
|
Fraud and Related Activities in Connection with Identification Documents, Authentication Features and Information.
|
Criminalized creation reproduction transfer possession or use of unauthorized of false identification documents or document making equipment.
|
|
Economic Espionage Act (1996)
|
Attempts to prevent trade secrets from being illegally shared.
|
|
Security and Freedom through Encryption Act (1999)
|
provides guidelines on the use of encryption and provides protection from government intervention.
|
|
Freedom of Information Act
|
allows any person to request access to federal agency records or information not determined to be a matter of national security.
|
|
Department of Homeland Security (2003)
|
made up of five directories or divisions thought which Carrie out its mission of protecting the people as well as physical and informational assets of the united states.
|
|
U.S Secret Service
|
agency within the department of the treasury. protects key members of the u.s government. detects and arrests people committing a us federal offense relating to computer fraud and false identification crimes.
|