According to the National Information Infrastructure Protection Act of 1996, the severity

National Information Infrastructure Protection Act, United States

The national information infrastructure is the collective computer and communication system that facilitates the operation of banks, businesses, schools, media, and the government. This infrastructure is crucial to the national economy and has expanded rapidly during the last decade. Because the network is computer based in the transmission of data, however, it is also vulnerable. In 1995, Congress passed the National Information Infrastructure Protection Act, a bill providing for increased security of federal and private computers, and Internet server systems.

The National Information Infrastructure Protection Act was created to further expand the protections granted by the Computer Fraud and Abuse Act of 1986. Under the new act, protective measures were extended to computer systems used in foreign and interstate commerce and communication. The bill consolidated several older laws, including standing espionage laws, and labeled new crimes for stealing classified information from government computers.

Privacy was another major concern expressed in the act. It further criminalized the use of government computers to obtain confidential records, such as individual tax or medical records. Violators would be subject to prosecution under federal law, and charged with a separate crime for the use of the computer to hack and disperse sensitive documents. If these documents were obtained and dispersed for personal gain or profit, the crime becomes a felony. Convicted common security hackers were thus sentenced more leniently than those who prosecutors demonstrated acted with malicious intent. In its final provision, the act identified and criminalized the practice of computer blackmail, that is the ransoming of stolen information or the demand for access to an online account.

Not only did the bill cover computer fraud, but it also had implications for copyright law and corporate espionage. A copyright law amendment to the National Information Infrastructure Protection Act sought to grant jurisdiction over certain web contents to individual parties. The bill failed because it would have placed regulations on the Internet. The issue of ownership in cyberspace, however, remains an unclear legal question.

Since the passage of the act, computer crimes continued to rise in number, but not in severity. Incidences of viruses, stolen identities, and computer espionage peaked before the turn of the new millennium.

SEE ALSO

Computer Fraud and Abuse Act of 1986
Computer Hackers
Computer Hardware Security
Information Security (OIS), United States Office of
Internet Surveillance

Recommended textbook solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

The Human Body in Health and Disease

7th EditionGary A. Thibodeau, Kevin T. Patton

1,505 solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

Clinical Reasoning Cases in Nursing

7th EditionJulie S Snyder, Mariann M Harding

2,512 solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

Medical Language

4th EditionSusan Turley

2,240 solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

The Language of Medicine

12th EditionDavi-Ellen Chabner

1,943 solutions

Scheduled maintenance: Monday, November 21 from 3PM to 5PM PST

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

Civil

____ law comprises a wide variety of laws that govern a nation or state.

Public

____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments.

Fraud

The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.

to harass

According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.

computer fraud and abuse act

The National Information Infrastructure Protection Act of 1996 modified which Act?

marketing

The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any ____ purposes.

health insurance

The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange.

Electronic Communications Privacy Act

Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications?

Financial Services Modernization Act

Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?

Federal Agency Information Security

What is the subject of the Computer Security Act?

Computer Fraud and Abuse Act

Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses?

USA Patriot Act

____ defines stiffer penalties for prosecution of terrorist crimes.

Economic Espionage Act

____ attempts to prevent trade secrets from being illegally shared.

Security and Freedom through Encryption Act

The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention.

Financial Reporting

What is the subject of the Sarbanes-Oxley Act?

2001

The Council of Europe adopted the Convention of Cybercrime in ____.

Singapore

Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources?

by accident

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage ____.

intent

Criminal or unethical ____ goes to the state of mind of the individual performing the act

Fear of penalty
Probability of being caught
Probability of penalty being administered
All of the above ;)

Laws and policies and their associated penalties only deter if which of the following conditions is present?

Students also viewed

ch 3

83 terms

catcode

Cybersecurity Final

53 terms

natalieranft

Module 2 Quiz

10 terms

wolfhaley17PLUS

Information security (EXAM 1, Chapter 3)

51 terms

nikkitucker

Sets found in the same folder

CH 2

91 terms

catcode

Chapter 11: Security and Personnel

58 terms

LessonsByBruno

Chapter 3 - ITSY 1300

50 terms

abbyoatman

ch 3

83 terms

catcode

Other sets by this creator

FRED

25 terms

yoder8

Exam 2 SBPF Chapter 11

13 terms

yoder8

EXAM 2 SBPF Chapter 10

11 terms

yoder8

Exam SBPF Chapter 9

18 terms

yoder8

Recommended textbook solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

The Cultural Landscape: An Introduction to Human Geography, AP Edition

13th EditionJames M. Rubenstein

216 solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

Anderson's Business Law and the Legal Environment, Comprehensive Volume

23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene

369 solutions

According to the National Information Infrastructure Protection Act of 1996, the severity

Mathematics with Business Applications

6th EditionMcGraw-Hill Education

3,760 solutions

Other Quizlet sets

Bible // Final Exam Study // Semester 1

56 terms

itskenskens04

Image formation (mriquiz)

25 terms

lgrindl1

Safety Terms for MSSC Exam

120 terms

okelleyb

Computer Fraud and Abuse Act (CFAA)

Which of the following acts is a collection of statutes that regulate the interception of wire electronic and oral communications?

L. 90-351; 6/19/68), also known as the "Wiretap Act": prohibits the unauthorized, nonconsensual interception of "wire, oral, or electronic communications" by government agencies as well as private parties, establishes procedures for obtaining warrants to authorize wiretapping by government officials, and.

What is the subject of the Computer Security Act quizlet?

What is the subject of the Computer Security Act? Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident. Key studies reveal that legal penalties are the overriding factor in leveling ethical perceptions within a small population.

Which of the following acts is also widely known as the Gramm Leach Bliley Act?

The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways financial institutions deal with the private information of individuals.