Types of Law
Type of Law | Description | Key Takeaway |
---|---|---|
Criminal Law | Contains prohibitions against actions like murder, assault, and robbery. | Can lead to jail/prison. |
Civil Law | Addresses contractual disputes, real estate transactions, employment, estate, and probate. | Often involves fights over money. |
Administrative Law | Defines standards of performance and conduct for industries, organizations, and government agencies. | E.g., FDA regulations on drug safety. |
Federal Acts and GuidelinesConcepts
Computer Fraud and Abuse Act (CFAA)
Introduction:The first major piece of US cybercrime-specific legislation.
Provisions:Made it a crime to:Access classified or financial information in a federal system without authorization.Use a federal computer to perpetrate a fraud.Cause malicious damage to a computer system exceeding $1,000.Modify medical records in a computer, impairing treatment.
Main focus is on unauthorized and malicious activities on federal systems.
Federal Sentencing Guidelines
Purpose:Provides punishment guidelines to assist federal judges in interpreting computer crime laws.Formalized the "prudent man" rule, emphasizing due care.
Burdens of Proof for Negligence:Legal Obligation: The accused must have a legally recognized obligation.E.g., Senior executives are responsible for ensuring due care.
Failure to Comply: The accused must have failed to comply with recognized standards.Causal Relationship: There must be a direct link between the negligence act and the resulting damages.
Federal Information Security Management Act (FISMA)
Definition:An act focused on formalizing infosec operations for the federal government.
Key Provisions:Mandatory for federal agencies to have formal infosec operations.Requires government agencies to include activities of contractors in their security management programs.
Historical Context:FISMA repealed and replaced:Computer Security Act of 1987.Government Information Security Reform Act of 2000.
Guidelines:NIST (National Institute of Standards and Technology) is tasked with developing the FISMA implementation guidelines.
It's unlikely that the specific details of NIST's guidelines for FISMA will be included in the exam.
Digital Millennium Copyright Act (DMCA)
Scope:Covers literary, musical, and dramatic acts.
Copyrights & Software:Precedent for copyrighting computer software as it can fall under "literary work".Protects only the expression inherent in the software (actual source code).
Ownership:Defaults to the creator of a work.Exception: "Works for hire". i.e., the work belongs to you unless you've been hired to make it for someone else.
Protection Duration:Typically lasts 70 years, but it can vary.
Revision:The 1st major revision included CD/DVD copy protections which introduced Digital Rights Management (DRM) – controversial at the time.
Intellectual Property (IP) and Licensing
- Trademarks:
- Cover words, slogans, and logos identifying companies and products/services. E.g., Coca-Cola or IBM.
- Purpose: Avoid marketplace confusion.
- Patents:
- Protect IP rights of inventors.
- Requirements: Must be new, useful, not obvious.
- Considerations:
- Limited protection.
- Disclosure of technology is required.
- Not all patented technologies are marketed.
E.g., Apple patents hinting at future products.
- Trade Secrets:
- Critical IP that should remain undisclosed.
- Bypasses the limitations of copyrights and patents.
Licensing
- Types:
- Contractual: Agreements written into a contract between a vendor and customer.
- Shrink-wrap: Old-school licensing with physical software purchases.
- Click-through: Common online agreements where users accept terms by clicking a button.
- Cloud Services: Advanced click-through, where terms are often hidden or require extra clicks.
Often, full details are not immediately visible.
Length of Protections
- Trademarks:
- Last for 10 years.
- Can potentially last indefinitely but must be renewed every decade.
Identity Theft and Assumption Deterrence Act
Scope:Makes identity theft a crime against the person whose identity was stolen.
Penalties:Up to a 15-year prison term and/or a $250,000 fine.
Year of Enactment:Became law in 1998.
Types of Intellectual Property Protections
Patents
- Duration:
- Typically granted for 20 years from the date of application.
- Examples:
- Vapes: Patented 20 years ago, became popular after patent expiry.
- Pharma: Vyvanse/Lisdexamphetamine.
Copyright
- Duration:
- Lasts for the lifetime of the author plus an additional 70 years.
- Notable Influences:
- Lobbying by corporations, such as Disney, to continually extend the duration.
Trade Secrets
- Duration:
- Indefinite.
- Definition:
- Intellectual property critical to a business that must not be disclosed.
Types
of ImportLaw and ExportRegulations
|
Description |
Category | Criminal |
US - Computer Fraud and Abuse Act ( |
The first major piece of US cybercrime-specific legislation. Main focus is on on federal systems. Made it a crime to:
|
Digital | Yes |
USA - Federal Information Security Management Act ( |
An act focused on formalizing infosec operations for the
|
Digital | No |
|
Covers literary, musical, and dramatic acts.
|
Digital | Yes |
US Federal Sentencing Guidelines |
Provides punishment guidelines to assist federal judges in interpreting computer crime laws. Formalized the "prudent man" rule, emphasizing due care. Burdens of Proof for Negligence include:
|
Digital | Guideline |
US Identity Theft and Assumption Deterrence Act of 1998 |
Makes identity theft a crime against the person whose identity was stolen.
|
Digital | Yes, up to a 15-year prison term and/or a $250,000 fine. |
Economic Espionage Act of 1996 |
|
Business | Yes |
Privacy Act of 1974 | Limits federal government agencies from disclosing private information without the affected individual's prior written consent. | Privacy | Yes |
US - Electronic Communications Privacy Act ( |
Criminalizes the invasion of electronic privacy of individuals. | Digital, Privacy | EPCA |
US - Comm Assistance for Law Enforcement Act ( |
|
Privacy | No |
US - Health Insurance Portability and Accountability Act ( |
|
Health | Yes |
US - Health Information Technology for Economic and Clinical Health Act of 2009 ( |
|
Digital, Health |
Yes |
US - Children's Online Privacy Protection Act ( |
Sets requirements for websites targeting children or collecting information from them. | Privacy | Sometimes |
US - Gramm-Leach-Bliley Act ( |
Focus
|
Business | Yes |
US - Sarbanes-Oxley Act (SOX) of 2002 |
Enacted in response to a number of major corporate and accounting scandals, including those affecting Enron, Tyco International, and WorldCom. The law's primary intent is to protect investors from fraudulent financial reporting by corporations. |
Business | Yes |
Family Educational Rights and Privacy Act ( |
|
Privacy | No |
USA PATRIOT Act of 2001 |
|
Privacy | |
PCI DSS (Payment Card Industry Data Security Standard) |
|
Finance | Not law; standards implemented by the banks. |
European Union Privacy Law |
|
Privacy | |
USEU: Privacy Shield |
|
Privacy | |
EU - GDPR (General Data Protection Regulation) |
Creation
|
Privacy | No |
Exporting even low-grade encryption technology outside the US was initially very restrictive. Now, there are specific categories for retail and mass-market security software. Firms can submit products for review to obtain export approval from the commerce department. Some encryption export controls still restrict certain encryption technologies from being exported outside the US.
US - International Traffic in Arms Regulations (ITAR) |
|
Governing Regultaion |
US - Export Administration Regulations (EAR) |
|
Governing Regulation |