Computer Security

Topics: Law, USA PATRIOT Act, Copyright Pages: 2 (810 words) Published: June 16, 2013
The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in. Civil law is a body of laws established by a state or nation for its own regulation. It helps keep order and peace and prevent criminals from acting without a consequence. Primary examples of public law are administrative, constitutional and criminal. An example of a public law is like a speed limit. Something that pertains to all people. The law that amended the Computer Fraud Abuse Act of 1986 is the National Information Infrastructure Protection Act of 1996, it changed several sections of the Computer Fraud Abuse Act and increased the penalties for selected crimes. The law that was specifically created to deal with encryption policy in the US was the Security and Freedom through Encryption Act of 1999. In an information security context, privacy is not absolute freedom from observation, but rather it is a more precise state of being free from unsanctioned intrusion. Another name for the Kennedy-Kassebaum Act is the Health Insurance Portability and Accountability Act of 1996, it is important to organizations not in the health care industry because of the fact that its limits what information is collectable from people's health records. It also allows people to be informed of how their information is being used and who can access it. The law from 1999 that affects your use of computer data is the Gramm-Leach-Bliley Act which affects all financial service organizations and how they use customer data. It makes all financial institutions must disclose privacy policies, describe how they share nonpublic personal information and describe how customers can place request to not have their information shared. It also gives out all revisions and updates annually to all customers. The primary purpose of the USA PATRIOT Act is to deter and punish terrorist acts in the US and around the world, and to enhance...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Android Hacking and Security Research Paper
  • Kudler Fine Foods IT Security Report Essay
  • Kirk Samuda, Kirk Patrick Samuda,
  • Security Breach Essay
  • Essay on Network Security
  • Security Question Essay
  • Vbb Vehicle Security System Essay
  • Security Threats of Mobile Banking Essay

Become a StudyMode Member

Sign Up - It's Free