Business > CASE STUDY > C841 Task 1 FINAL.docx C841 Legal Issues in Information Security – C841 Task 1 Wes (All)

C841 Task 1 FINAL.docx C841 Legal Issues in Information Security – C841 Task 1 Wes

Document Content and Description Below

C841 Task 1 FINAL.docx C841 Legal Issues in Information Security – C841 Task 1 Western Governors University Relevancy of the Computer Fraud and Abuse Act (CFAA) CFAA addresses the compr... omise of confidentiality against a protected computer, which is any federal computer, financial computer, or any computer used in interstate or foreign commerce. Within the case study, the Business Intelligence (BI) Unit of TechFite utilized fake user accounts to gain unauthorized access to computers in TechFites financial department which resulted in the loss of confidentiality of these systems. By compromising the confidentiality of these finance computers, the Business Intelligence Unit violated the Computer Fraud and Abuse Act because the TechFite finance computers are considered protected computers due to their role in interstate. Relevancy of the Electronic Communications Privacy Act (ECPA) The ECPA addresses unauthorized access to electronic communications, whether stored on a hard drive or in transit over the network. Within the case study, Sarah Miller from TechFites BI unit conducted scanning activity into the private networks of several Internet-based companies. Because these internal communications were within the private networks of outside companies, Sarah Miller violated the Electronic Communications Privacy Act. Three Laws that Justify Legal Action Three laws that can be used in the justification of legal action against negligent activity observed within the TechFite case study are the Com. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 2 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

169
0

Document information


Connected school, study & course


About the document


Uploaded On

Jun 12, 2022

Number of pages

7

Written in

Seller


seller-icon
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Jun 12, 2022

Downloads

 0

Views

 169

Document Keyword Tags

Recommended For You

Get more on CASE STUDY »

$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·