IS CH3 – Flashcard
Unlock all answers in this set
Unlock answersquestion
law comprises a wide variety of laws that govern a nation or state.
answer
Civil
question
law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments
answer
Public
question
The Computer ____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts.
answer
Fraud
question
According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except ____.
answer
to harass
question
The National Information Infrastructure Protection Act of 1996 modified which Act
answer
Computer Fraud and Abuse Act
question
The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any ____ purposes
answer
marketing
question
The ____ Portability and Accountability Act Of 1996, also known as the Kennedy-Kassebaum Act, protects the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data interchange
answer
Health Insurance
question
Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications
answer
Electronic Communications Privacy Act
question
Which of the following acts is also widely known as the Gramm-Leach-Bliley Act
answer
Financial Services Modernization Act
question
What is the subject of the Computer Security Act
answer
Federal Agency Information Security
question
Which of the following acts defines and formalizes laws to counter threats from computer related acts and offenses
answer
Computer Fraud and Abuse Act
question
defines stiffer penalties for prosecution of terrorist crimes
answer
USA Patriot Act
question
attempts to prevent trade secrets from being illegally shared
answer
Economic Espionage Act
question
The ____ of 1999 provides guidance on the use of encryption and provides protection from government intervention
answer
Security and Freedom through Encryption Act
question
What is the subject of the Sarbanes-Oxley Act
answer
Financial Reporting
question
The Council of Europe adopted the Convention of Cybercrime in
answer
2001
question
Which of the following countries reported generally intolerant attitudes toward personal use of organizational computing resources
answer
Singapore
question
Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage
answer
by accident
question
Criminal or unethical ____ goes to the state of mind of the individual performing the act
answer
intent
question
Laws and policies and their associated penalties only deter if which of the following conditions is present
answer
a. Fear of penalty b. Probability of being caught c. Probability of penalty being administered d. All of the above