C841 Task 1 FINAL.docx C841 Legal Issues in Information Security
C841 Task 1 2 Relevancy of the Computer Fraud and Abuse Act (CFAA) CFAA addresses the compromise of confidentiality against a protected computer, which is any federal computer, financial computer, or any computer used in interstate or foreign commerce. Within the case study, the Business Intelligence (BI) Unit of TechFite utilized fake user accounts to gain unauthorized access to computers in TechFite’s financial department which resulted in the loss of confidentiality of these systems. By compromising the confidentiality of these finance computers, the Business Intelligence Unit violated the Computer Fraud and Abuse Act because the TechFite finance computers are considered protected computers due to their role in interstate. Relevancy of the Electronic Communications Privacy Act (ECPA) The ECPA addresses unauthorized access to electronic communications, whether stored on a hard drive or in transit over the network. Within the case study, Sarah Miller from TechFite’s BI unit conducted scanning activity into the private networks of several Internet-based companies. Because these internal communications were within the private networks of outside companies, Sarah Miller violated the Electronic Communications Privacy Act.
Written for
- Institution
- C841
- Course
- C841
Document information
- Uploaded on
- July 15, 2022
- Number of pages
- 7
- Written in
- 2021/2022
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- financial computer
- or
-
c841 task 1 2 relevancy of the computer fraud and abuse act cfaa cfaa addresses the compromise of confidentiality against a protected computer
-
which is any federal computer