answersLogoWhite

0


Best Answer

Computer Fraud & Abuse Act

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Does Non Sensitive information must be cleared for public release and protected from unauthorized changes?

FALSE


Does Non-Sensitive information must be cleared for public release and protected from unauthorized changes?

FALSE


Why do people have a passwordBecause if they did not others will try to hack in to peoples computers?

If computers were not password protected, anyone who could use it and see any information you had stored.


What are 2 classifications of critical information?

Two classifications of critical information are confidential and sensitive. Confidential information is data that must be protected from unauthorized access or disclosure, while sensitive information is data that, if compromised, could cause harm to an individual or organization.


Why was the data protection act needed in 1998?

The Data Protection Act of 1998 was needed to ensure that personal information stored on computers or in an organized paper filing system was handled properly and protected from misuse. It aimed to give individuals more control over their data and regulate how organizations processed and stored personal information to prevent unauthorized access or disclosure.


When the meaning of information is disclosed to only authorized individuals which service is provided?

The service provided in this scenario is typically referred to as confidentiality. It ensures that only authorized individuals or parties have access to the information and that it remains private and protected from unauthorized disclosure.


Mod What are the three key aspects of information assurance?

The three key aspects of information assurance are confidentiality, integrity, and availability. Confidentiality ensures that information is protected from unauthorized access. Integrity ensures that information is accurate and reliable. Availability ensures that information is accessible to authorized users when needed.


What is taken into consideration when determining which critical information should be protected?

When determining which critical information should be protected, factors such as the sensitivity of the information, potential impact of unauthorized access or disclosure, legal and regulatory requirements, business value, and the potential threats and risks involved are taken into consideration. Organizations also consider the need for confidentiality, integrity, and availability of the information when determining the level of protection required.


Does Personal Indifiable Information filed in ERM have to password protected?

Yes, Personal Identifiable Information (PII) stored in Electronic Records Management (ERM) systems should be password protected to ensure data security and compliance with privacy regulations. Implementing access controls such as passwords, encryption, and user authentication helps prevent unauthorized access to sensitive information.


Computers are susceptible to viruses unless they are protected by special software and firewalls.?

Computers are susceptible to viruses unless they are protected by special software and firewalls.


If you have a credit card through American express and your parents apply for a card as well will the company inform them of your account with them even though you are over 18?

no. your information is protected and restricted from release to unauthorized parties. (including family)


Why are medical records protected by the law?

Medical records are protected by laws to maintain patient confidentiality, promote trust in the healthcare system, and safeguard sensitive information from unauthorized access or disclosure. These laws, such as HIPAA in the US, help ensure that healthcare providers and organizations follow strict guidelines to protect patient privacy and maintain the integrity of medical information.