• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
Civil Law
preponderance of evidence

wrong against another person or business

normally results in loss or damage

Liability, due care, due diligence, prudent person rule

easier to convict

just prove liable
Criminal Law
wrongs against society (victim)

jail time, probation, financial reward

purpose to punish offender
Compensatory Damages (civil)
Paid for the actual damage suffered by the victim

medical costs, attorney fees
Punitive damages (civil)
Designed to punish the offender
Statutory damages (civil)
amount stipulated by the law not on degree of harm
Criminal Law
Beyond reasonable doubt

jail time, death

goal of criminal is punishment, deterrence, loss of freedom
Oran's Law (1983)
treason is citizens action to help foreign government overthrow or make war
Administrative (regulatory) law
Standards of performance
regulates conduct for specific industries

burden of proof "more likely than not"
Intellectual Property law
company must take steps to protect resources or law may not protect them

licensing, plagiarism, piracy
World Intellectual Property Organization (WPO)
run by the UN

handles complaints and enforcement
Trade Secret
early in the process before patents
should provide competitive value
property to a company and important for survival
must be genuine and not obvious
Copyright
Last for the lifetime of author plus 70 years
75 years for corporations
does not need to be registered or published
expression of ideas rather than the idea
author controls distribution, reproductions, derivatives
Trademark
Branding

words, symbols, sound, color shapes, color combinations

company "look and feel"
Patent
inventions
owner has exclusive control for 20 years
strongest form of protection
no organization enforces patents, has to go to court
Software Protection Agency (SPA)
enforce proprietary rights of software

international:
Federation Against Software Theft (FAST)-London
Business Software Alliance (BSA) - D.C.
Cybersquatting
buying up domain names to sell
Typosquatting
leverage typo's "GOOOGLE"
Dilution
"Kleenex"

tissues
Business Associate
performs an action on behalf of the covered entity
Downstream Liability
insures organizations working together under a contract are responsible for their info security
WASSENAAR
makes it illegal to export munitions to terrorist
Strong encryption
any algorithm with key sizes over 40 bits
Safe Harbor
illegal to transmit certain types of data (different countries)
Data Haven
refuge for uninterrupted or unregulated data
weak information system enforcement and extradition laws
a location with intentionally strong protections of data
domains designed to secure data via technical means(encryption)
ISC2 code of ethics canons
1. Protect the society, commonwealth and infrastructure
2. Act honorably, honestly, justly, responsibly
3. Provide diligent and competent service to principles
4.Advance and protect the profession
Internet Activities Board (IAB)
Committee for internet design, engineering and management
Unethical:
gaining unauthorized access to internet resources
Comprising privacy
Wasting resouces
Computer assisted crime
computer used as a tool in the crime
Computer targeted crime
computer was the victim
Computer incidental crime
computer not necessary but just happened to be involved
Salami
skimming small amounts of money with the hopes of not getting noticed
Data diddling
altering data before input or after output
Reason for Internal investigations
information is controlled
time and resources
BAD-limited knowledge
consultants doing investigations
NDA NDA NDA
information is controlled
fourth amendment
search and seizure must have probable cause

private citizen not subject to this
Computer evidence
needs subpoena, search warrant, voluntary consent

EXCEPT if suspect is about to destroy
exigent circumstances
can get evidence without supeona, search warrant, voluntary consent
Digital evidence must
be authentic
be accurate
be complete
be convincing
be admissible
Forensic investigation process (IPCEAPD)
Identification
Preservation - chain of custody
Collection
Examination
Analysis
Presentation
Decision
Chain of custody
who obtained and secured it
where and when it was obtained
who had control or possession
evidence life cycle
collection and id
analysis
storage, preservation, transportation
present in court
return to owner(victim)
Prudent Man Rule
perform duties that prudent people would exercise in similar circumstances
downstream liabilities
connected technology can extend responsibility outside normal bounds
Value Added Network (VAN)
Extranets
Organization under HIPAA must provide privacy notice:
at the time of FIRST service delivery
anytime it's requested
must post a copy
HIPAA, employers can advocate when
only after receiving employee's consent
HIPAA Gap Analysis for transactions
identifies and matches data content required by HIPAA
HIPAA Gap Analysis for privacy
identifies the CURRENT polices and procedures in an org regarding CONFIDENTIALITY
3 times ok for disclosure of patient data
qualified personnel for AUDIT
qualified personnel for RESEARCH
medical personnel for medical emergency
HIPAA is only ??? providers?
SOME
HIPAA enforced by
Office of civil rights of Dept of Health and Human services (DSS)
Computer Fraud and Abuse Act
prohibits knowingly accessing federal gov computers to obtain info without authorizaiton
Federal Privacy Act of 1974
Written permission must be obtained by gov agency to disclose private info the ageny has
BASEL II
required "minimum capital requirements"
Computer Security Act of 1987
should be security awareness training
computer security plan should developed for a network
computers containing sensitive info should be identified
1991 Federal Sentencing Guidelines
Deals with White Collar Crimes
Electronic Communications Privacy Act of 1986
Prohibits eavesdropping of wire, oral, and electronic communications
Gramm Leach Bliley Act (GLBA)
deals with privacy