100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary C841___Task_1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS :C841: Legal Issues in Information Security

Rating
5.0
(1)
Sold
5
Pages
9
Uploaded on
03-08-2021
Written in
2021/2022

C841___Task_1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS :C841: Legal Issues in Information Security










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 3, 2021
Number of pages
9
Written in
2021/2022
Type
Summary

Subjects

Content preview

Running head: TECHFITE CASE STUDY LEGAL ANALYSIS 1
TechFite Case Study Legal Analysis
Cameron F. Finley
Student #000761328
Western Governor’s University
C841: Legal Issues in Information SecurityThis study source was downloaded by 100000829696844 from CourseHero.com on 08-03-2021 03:44:53 GMT -05:00
https://www.coursehero.com/file/59312340/C841-Task-1docx/This study resource was
shared via CourseHero.com TechFite Case Study Legal Analysis
Upon suspicion of unethical and illegal activity, board of directors’ chairperson for TechFite John Jackson commissioned independent investigators to conduct a security audit of the
IT and business practices of the Applications Division. At the conclusion of the investigation, several pieces of evidence pointing to wrongdoing on the part of some of the key personnel in the Applications Division were found. Specifically, damages of intellectual property rights against two potential clients of TechFite were found to have taken place as a result of malfeasance on the part of the Applications Division. This is a legal analysis of those findings and guidance for TechFite to use for corrective and perhaps legal action moving forward.
A – Application of Law
The principle laws relevant to this section of the analysis are Federal Statutes the Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA). A1 – CFAA & ECPA
The Computer Fraud and Abuse Act was passed and signed into law in 1986. The CFAA criminalizes certain types of damage against a “protected computer”. Under the statute, a protected computer qualifies as a computer used by the federal government, a computer used by a financial institution, and a computer used in interstate or foreign commerce. (Bailie, n.d.)
Under the definition of a computer used in interstate or foreign commerce, the CFAA expands the definition of a protected computer to include the Internet because it is used to facilitate commerce between different states. The CFAA also prohibits the unauthorized trafficking of computer access information that allows people to access other computers without authorization as well as users that exceed the scope of their authorization level without granted permissions or maliciously so.
The Electronic Communications Privacy Act protects the privacy of communications transfers via electronic means such as wire and radio but does not protect oral communications, paged communications, and more. It also protects communications held in electronic storage from unauthorized access. Like provisions in the CFAA, this extends to unauthorized privilege escalation with the intent to view, steal, or otherwise coopt documents and resources intended for
another party. (“What is the Electronic Communications Privacy Act?,” n.d.) In the course of the TechFite investigation, it was discovered that the company conducts business via Internet and wire transfer with three possible “shell” companies and banks in This study source was downloaded by 100000829696844 from CourseHero.com on 08-03-2021 03:44:53 GMT -05:00
https://www.coursehero.com/file/59312340/C841-Task-1docx/This study resource was
shared via CourseHero.com

Reviews from verified buyers

Showing all reviews
2 year ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Nipsey Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2042
Member since
5 year
Number of followers
1524
Documents
14950
Last sold
3 days ago
LECT EXAMS

FOR THE BEST ASSIGNMENTS,TEST BANKS,EASSY AND TO HELP IN TUTORING I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc , and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!

Read more Read less
4.1

363 reviews

5
212
4
55
3
55
2
14
1
27

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions