Types of Law
Type of Law | Description | Key Takeaway |
---|---|---|
Criminal Law | Contains prohibitions against actions like murder, assault, and robbery. | Can lead to jail/prison. |
Civil Law | Addresses contractual disputes, real estate transactions, employment, estate, and probate. | Often involves fights over money. |
Administrative Law | Defines standards of performance and conduct for industries, organizations, and government agencies. | E.g., FDA regulations on drug safety. |
Concepts
Intellectual Property (IP) and Licensing
- Trademarks:
- Cover words, slogans, and logos identifying companies and products/services. E.g., Coca-Cola or IBM.
- Purpose: Avoid marketplace confusion.
- Patents:
- Protect IP rights of inventors.
- Requirements: Must be new, useful, not obvious.
- Considerations:
- Limited protection.
- Disclosure of technology is required.
- Not all patented technologies are marketed.
E.g., Apple patents hinting at future products.
- Trade Secrets:
- Critical IP that should remain undisclosed.
- Bypasses the limitations of copyrights and patents.
Licensing
- Types:
- Contractual: Agreements written into a contract between a vendor and customer.
- Shrink-wrap: Old-school licensing with physical software purchases.
- Click-through: Common online agreements where users accept terms by clicking a button.
- Cloud Services: Advanced click-through, where terms are often hidden or require extra clicks.
Often, full details are not immediately visible.
Length of Protections
- Trademarks:
- Last for 10 years.
- Can potentially last indefinitely but must be renewed every decade.
Types of Intellectual Property Protections
Patents
- Duration:
- Typically granted for 20 years from the date of application.
- Examples:
- Vapes: Patented 20 years ago, became popular after patent expiry.
- Pharma: Vyvanse/Lisdexamphetamine.
Copyright
- Duration:
- Lasts for the lifetime of the author plus an additional 70 years.
- Notable Influences:
- Lobbying by corporations, such as Disney, to continually extend the duration.
Trade Secrets
- Duration:
- Indefinite.
- Definition:
- Intellectual property critical to a business that must not be disclosed.
Types of Law and Regulations
Name |
Description |
Category | Criminal |
US - Computer Fraud and Abuse Act (CFAA) |
The first major piece of US cybercrime-specific legislation. Main focus is on on federal systems. Made it a crime to:
|
Digital | Yes |
USA - Federal Information Security Management Act (FISMA) |
An act focused on formalizing infosec operations for the federal government.
|
Digital | No |
US - Digital Millennium Copyright Act (DMCA) |
Covers literary, musical, and dramatic acts.
|
Digital | Yes |
US Federal Sentencing Guidelines |
Provides punishment guidelines to assist federal judges in interpreting computer crime laws. Formalized the "prudent man" rule, emphasizing due care. Burdens of Proof for Negligence include:
|
Digital | Guideline |
US Identity Theft and Assumption Deterrence Act of 1998 |
Makes identity theft a crime against the person whose identity was stolen.
|
Digital | Yes, up to a 15-year prison term and/or a $250,000 fine. |
Economic Espionage Act of 1996 |
Economic Espionage: The theft or misappropriation of a trade secret with the intent or knowledge that the offense will benefit a foreign government, foreign instrumentality, or foreign agent.
|
Business | Yes |
Privacy Act of 1974 | Limits federal government agencies from disclosing private information without the affected individual's prior written consent. | Privacy | Yes |
US - Electronic Communications Privacy Act (EPCA) of 1986 | Criminalizes the invasion of electronic privacy of individuals. | Digital, Privacy | EPCA |
US - Comm Assistance for Law Enforcement Act (CALEA) of 1994 |
|
Privacy | No |
US - Health Insurance Portability and Accountability Act (HIPAA) |
|
Health | Yes |
US - Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH) |
|
Digital, Health | Yes |
US - Children's Online Privacy Protection Act (COPAA) | Sets requirements for websites targeting children or collecting information from them. | Privacy | Sometimes |
US - Gramm-Leach-Bliley Act (GLBA) |
Focus on Services, banks, lenders, and insurance. Limitations include services and the data sharing among them. |
Business | Yes |
US - Sarbanes-Oxley Act (SOX) of 2002 |
Enacted in response to a number of major corporate and accounting scandals, including those affecting Enron, Tyco International, and WorldCom. The law's primary intent is to protect investors from fraudulent financial reporting by corporations. |
Business | Yes |
Family Educational Rights and Privacy Act (FERPA) |
Provides privacy rights to students over 18 and the parents of minor students. |
Privacy | No |
USA PATRIOT Act of 2001 |
|
Privacy | |
PCI DSS (Payment Card Industry Data Security Standard) |
Ensures the security of card transactions. Created in 2004 by major credit card companies. Objectives include:
|
Finance | Not a law; standards implemented by the banks. |
European Union Privacy Law 1998 |
Directive that established privacy measures for protecting personal data processed by information systems. Served as the precursor to EU privacy law. Non-European Organizations need to determine the applicability of these rules when operating or dealing with European data. |
Privacy | |
USEU: Privacy Shield |
An agreement between the EU and US detailing specific requirements for processing personal information. Compliant businesses get safe harbor from potential prosecution or legal consequences. Requirements include:
|
Privacy | |
EU - GDPR (General Data Protection Regulation) |
Creation of unified data protection entities in each EU member state. Applicable to organizations collecting data from EU residents or those processing such information on behalf of another entity.
|
Privacy | No |
Exporting even low-grade encryption technology outside the US was initially very restrictive. Now, there are specific categories for retail and mass-market security software. Firms can submit products for review to obtain export approval from the commerce department. Some encryption export controls still restrict certain encryption technologies from being exported outside the US.
US - International Traffic in Arms Regulations (ITAR) |
|
Governing Regultaion |
US - Export Administration Regulations (EAR) |
|
Governing Regulation |