National Information Infrastructure Protection Act, United StatesThe national information infrastructure is the collective computer and communication system that facilitates the operation of banks, businesses, schools, media, and the government. This infrastructure is crucial to the national economy and has expanded rapidly during the last decade. Because the network is computer based in the transmission of data, however, it is also vulnerable. In 1995, Congress passed the National Information Infrastructure Protection Act, a bill providing for increased security of federal and private computers, and Internet server systems. Show
The National Information Infrastructure Protection Act was created to further expand the protections granted by the Computer Fraud and Abuse Act of 1986. Under the new act, protective measures were extended to computer systems used in foreign and interstate commerce and communication. The bill consolidated several older laws, including standing espionage laws, and labeled new crimes for stealing classified information from government computers. Privacy was another major concern expressed in the act. It further criminalized the use of government computers to obtain confidential records, such as individual tax or medical records. Violators would be subject to prosecution under federal law, and charged with a separate crime for the use of the computer to hack and disperse sensitive documents. If these documents were obtained and dispersed for personal gain or profit, the crime becomes a felony. Convicted common security hackers were thus sentenced more leniently than those who prosecutors demonstrated acted with malicious intent. In its final provision, the act identified and criminalized the practice of computer blackmail, that is the ransoming of stolen information or the demand for access to an online account. Not only did the bill cover computer fraud, but it also had implications for copyright law and corporate espionage. A copyright law amendment to the National Information Infrastructure Protection Act sought to grant jurisdiction over certain web contents to individual parties. The bill failed because it would have placed regulations on the Internet. The issue of ownership in cyberspace, however, remains an unclear legal question. Since the passage of the act, computer crimes continued to rise in number, but not in severity. Incidences of viruses, stolen identities, and computer espionage peaked before the turn of the new millennium. SEE ALSOComputer Fraud and Abuse Act of 1986 Recommended textbook solutions
The Human Body in Health and Disease7th EditionGary A. Thibodeau, Kevin T. Patton 1,505 solutions
Clinical Reasoning Cases in Nursing7th EditionJulie S Snyder, Mariann M Harding 2,512 solutions Medical Language4th EditionSusan Turley 2,240 solutions The Language of Medicine12th EditionDavi-Ellen Chabner 1,943 solutions Scheduled maintenance: Monday, November 21 from 3PM to 5PM PST
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (20)Civil ____ law comprises a wide variety of laws that govern a nation or state. Public ____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments. Fraud The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts. to harass According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____. computer fraud and abuse act The National Information Infrastructure Protection Act of 1996 modified which Act? marketing The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any ____ purposes. health insurance The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange. Electronic Communications Privacy Act Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications? Financial Services Modernization Act Which of the following acts is also widely known as the Gramm-Leach-Bliley Act? Federal Agency Information Security What is the subject of the Computer Security Act? Computer Fraud and Abuse Act Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses? USA Patriot Act ____ defines stiffer penalties for prosecution of terrorist crimes. Economic Espionage Act ____ attempts to prevent trade secrets from being illegally shared. Security and Freedom through Encryption Act The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention. Financial Reporting What is the subject of the Sarbanes-Oxley Act? 2001 The Council of Europe adopted the Convention of Cybercrime in ____. Singapore Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources? by accident Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____. intent Criminal or unethical ____ goes to the state of mind of the individual performing the act Fear of penalty Laws and policies and their associated penalties only deter if which of the following conditions is present? Students also viewedch 383 terms catcode Cybersecurity Final53 terms natalieranft Module 2 Quiz10 terms wolfhaley17PLUS Information security (EXAM 1, Chapter 3)51 terms nikkitucker Sets found in the same folderCH 291 terms catcode Chapter 11: Security and Personnel58 terms LessonsByBruno Chapter 3 - ITSY 130050 terms abbyoatman ch 383 terms catcode Other sets by this creatorFRED25 terms yoder8 Exam 2 SBPF Chapter 1113 terms yoder8 EXAM 2 SBPF Chapter 1011 terms yoder8 Exam SBPF Chapter 918 terms yoder8 Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions The Cultural Landscape: An Introduction to Human Geography, AP Edition13th EditionJames M. Rubenstein 216 solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene 369 solutions
Mathematics with Business Applications6th EditionMcGraw-Hill Education 3,760 solutions Other Quizlet setsBible // Final Exam Study // Semester 156 terms itskenskens04 Image formation (mriquiz)25 terms lgrindl1 Safety Terms for MSSC Exam120 terms okelleyb Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?Computer Fraud and Abuse Act (CFAA)
Which of the following acts is a collection of statutes that regulate the interception of wire electronic and oral communications?L. 90-351; 6/19/68), also known as the "Wiretap Act": prohibits the unauthorized, nonconsensual interception of "wire, oral, or electronic communications" by government agencies as well as private parties, establishes procedures for obtaining warrants to authorize wiretapping by government officials, and.
What is the subject of the Computer Security Act quizlet?What is the subject of the Computer Security Act? Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident. Key studies reveal that legal penalties are the overriding factor in leveling ethical perceptions within a small population.
Which of the following acts is also widely known as the Gramm Leach Bliley Act?The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.
|