answersLogoWhite

0

Computer Security Law

Computer security means protecting the confidentiality, integrity, and availability of information stored on, processed by, and transmitted by computers. In order to achieve this, various governments and organizations have established laws, regulations, and standards for securing computers and the data stored, processed, and transmitted by them. This category is for questions about existing and proposed laws and standards specifically related to computer security including the contents of the laws & regulations, who is legally responsible, who/what the laws/regulations/standards apply to, how the security is evaluated, and how it is documented.

310 Questions

Explain how copying a computer software is a crime?

Just like a book or a movie, computer software can be owned. If you copy it without permission from the owner, you are violating their ownership rights and effectively stealing a copy of it.

Is it illegal to use a copyrighted website in one country and put it into a international market?

If you mean copy a site that is copyrighted in one country and then use it as if it were your own but hosted in another country, then - YES - that is illegal. You have just violated the copyright within the country.

As an example: if you copy a book published in the UK and copyrighted there and then publish it and sell it in India, the UK can prosecute you - but only in the UK. Anyone selling the pirated book in the UK could be prosecuted. It might be difficult, however to get any prosecution in India unless they respect the UK copyright.

The situation with copyrighted material and content of a website. People can - and do - steal content and host it on servers in other countries. The most that can usually be done is to request that the host shut it down under threat of having their entire company added to blacklists of hosting services that are automatically blocked by responsible ISPs in most countries.

If you mean - is it illegal to copyright a website in one country but host it elsewhere, then - generally NO - the copyright applies to the website, not the host. To use the book analogy: if you copyright a book but use a publisher in another country to actually print it, the copyright is still valid. Nothing about copyright law says where you have to print it; it just says that no one else can copy the book and sell it without your permission within the area where it is under copyright.

Is it legal to hack online games?

The legality of "hacking" an online game depends on what you mean by "hacking".

In the most common use of the term - it is illegal to hack an online game. In order to hack an online game, you are usually hacking the server that hosts the game. This is breaking and entering into a server that does not belong to you.

  • If you are using cheat codes - that may not be illegal.
  • If you alter the code, that's the kind of illegal hacking mentioned above.
  • If you have legal access to the code - for instance if it is an open source community owned game, you may be able to legally "hack" it and modify it.

Is it a violation of the Privacy Act of 1974 if an agency loses paperwork with your personal information?

The answer depends partly on what you mean by "loses".

If by "loses" you mean that they can't find your information then they might be in violation by failing to be able to provide it to you when requested - but then again, if they can't find it, then there may be difficulty proving that they are withholding information if you can't prove they actually have it (which, if they can't find it sort of leans towards demonstrating that they DON'T have it, even if the SHOULD)

If by "loses" you mean loses control of the information - for example because someone (unauthorized) intercepted the transmission or grabbed a fax, or hacked into the system, the Act probably doesn't cover that. It is designed to instruct agencies as to what they can intentionally do with the data they have and who they can intentionally disclose it to. In fact there are court cases that indicate that a plaintiff has the burden of demonstrating that a disclosure by the agency has occurred. One court stated that:

"As the district court noted, [appellant] cites 'no authority to suggest that the possibility that a record might be revealed to unauthorized readers by negligent or reckless transmission is sufficient to constitute a prohibited disclosure under the Act,' . . . nor have we found any authority so holding."

That sort of suggests that that particular act doesn't do anything to protect you if an agency allows someone to get your information because they are sloppy - just if they INTENTIONALLY give to someone they were not supposed to.

What peer to peer programs are legal?

The legality of peer to peer programs depends on the laws of the country you are located in and the way the peer to peer program operates. A key issue is whether the peer to peer program encrypts traffic between the computers. In some nations using such encrypted connections is illegal because they want to be able to monitor all traffic and identify anyone who is not in compliance with their official policies, making fun of the leaders, opposing those in power, or engaging in activities that have been deemed illegal in their country.

Note that even if a peer to peer program is legal, it can become effectively illegal if used for illegal purposes such as sharing pirated files.

Can you find out what IP address a computer was LAST connected to A laptop disappeared recently from a business and has mysteriously re-appeared - any help gratefully received Thanks?

If you want to get your last connected IP you need to contact with your ISP service provider they deliver you your last connected IP

==========

It depends on how the computer was connected. If the machine was configured for DHCP, the registry key in the SYSTEM hive at SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces will contain the DHCP IP address that was assigned, the subnet masks, and the DHCP server's IP address.

What is the maxium time for a computer crime C felony in the state of Oregon?

In Oregon (as of 2016) the maximum penalty for a Class C Felony is 5 years / $125,000 fine.

Is it legal for schools to keep a cell phone for 9 weeks?

If it is legal for schools to keep a cell phone for 9 weeks would depend upon what their code of conduct rules say. Most schools will not keep a phone for this long.

Will the new DoD computer security assessment and authorization process be called DIARMF or just RMF?

It will be called RMF.

The newest DoD guidance is DoDI 8500.1, "Cybersecurity", issued March 14, 2014. This reissues and renames DoD Directive (DoDD) 8500.01E as an instruction (DoDI) and incorporates and cancels DoDI 8500.02. The current DIACAP process is to be replaced by National Institute of Standards and Technology (NIST) Special Publication (SP) 800-39 which is titled "Managing

Information Security Risk: Organization, Mission, and Information System View," Committee on National Security Systems (CNSS) Policy (CNSSP) 22 which is titled "Policy on Information Assurance Risk Management for National Security Systems," and DoDI 8510.01 which is titled "Risk Management Framework (RMF) for DoD Information Technology (IT)."

Is one time using somebody else's log-in and password to paid web found on a free web illegal?

Generally using someone else's password to access a paid site is considered "theft of services" and is illegal

Is it illegal to change someone's profile picture in gmail if you DON'T read any emails?

In general - yes. Some jurisdictions may actually not have any laws that cover such deeds, but most countries and jurisdictions have laws that get you in trouble if you access someone's personal account and modify it without their permission - even if it's just changing their picture. It doesn't matter if it is in gmail or MS Outlook - or some other account. It may not get you in as much trouble as compromising the confidentiality of their account by reading their emails, but you have still attacked the integrity of their account.

Will a divorce court judge grant a subpoena for your spouse's work email?

The answer depends on the the jurisdiction - and of course, the judge. Usually you must show the judge sufficient proof that the work email contains critical information relevant to your divorce. Although it is not the same as a search warrant, if you think in terms of what is required for a search warrant, you won't be that far off from what would be expected if you wanted to subpoena a spouse's work email. It may be simpler to approach the employer who actually owns the work email (in most jurisdictions employers own the email, not the employee).

What can you do about being posted on thedirtycom?

Not much. You can pay a lawyer to contact them & request that you be removed but I'm not sure if anything can be done beyond that.

Can you get in legal trouble for scamming on ROBLOX?

That depends a great deal on what you mean by "scamming". If you lie to someone, it depends on the nature of the lie. If you trick someone, it depends on what you trick them into doing. Some of the key questions are:

1) did you profit from scamming someone

2) did the victim of the scam suffer financial loss from the scam

What is American border's phone number?

That depends on where you are crossing the border. In general you would have to refer to the U.S. Customs and Border Protection (CBP). You can get more information from their website at the attached related link.

What is scif clearance?

"SCIF clearance" refers to having the necessary security clearance and "need-to-know" to be present in a SCIF without it being "sanitized" prior to entry and without escort.

SCIF is an acronym used by the US military to refer to a Sensitive Compartmented Information Facility. Typically access to such a facility requires a TS/SCI (top-secret special compartmented information) clearance specifically for the SCI (Sensitive Comparmented Information) being processed within the facility. SCI is not a "classification" so it is actually possible for information to be SCI but classified at the Secret or even Confidential level, although this is much less common than for Top-Secret information. SCI is based on the principle of "need-to-know" rather than the degree of damage that would occur if the information was disclosed (which is how Confidential, Secret, and Top-Secret classifications are assigned).

What diploma do you need to do computer law?

The answer depends on what aspect of computer law you want to "do". To actually practice law and litigate on legal matters involving computer usage, software copyrights and patents, etc. you need a law degree in the USA. I'm not sure what is required elsewhere like the UK or India or Japan or South Africa, etc.

To work in compliance you probably need a legal degree and/or a technical degree such as computer science with an computer security emphasis or computer network security or software engineering or computer forensics emphasis.

Many people who work in the field go for certifications rather than degrees. Certifications like CEH (Certified Ethical Hacker) or CISSP or Security+ or CISA or CISM or GSNA might be useful.

Do you need permission to publish a translation of one Spanish poem?

Probably yes.


Literary translation is a very specialized form of translation that is typically done by linguists who could be considered authors in their own right. You might think that an author would be pleased to have their work introduced in new markets. However, if a literary work such as a poem, were translated and published in a new language that would potentially limit the author in benefiting from sales in secondary markets and the decision to release the poem or a collection of poems in other markets should rest completely with the holder of the copyright. Even if the translation is distributed for free the ability to sell in that market would certainly be impaired by a free translation being circulated.

If the author has exercised copyright in the country where the poem might be published (usually via international copyright) you would have to seek permission to publish the translation. You could still publish a translation of an excerpt from the poem under "fair use". Note that if the author has not filed for international copyright you might not need to ask permission, but it would still be wise to seek it if possible, if for no other reason than to be a decent human being.


Considering that this question was asked in the Computer Security Law category we might assume that the person posing the question is interested in publishing the poem on-line.


Considering that this question was asked in the Computer Security Law category we might assume that the person posing the question is interested in publishing the poem on-line. Copyright laws do not distinguish between publishing on-line without permission and publishing on paper without permission.


What if a machine translation tool in the public domain is used to create that translation? In general machine translations are still of such poor quality that they might escape classification as plagiarismor copyright infringement. The original version from which the translation was created would still be covered by copyright however.

How does computer ethics affect people in a legal way?

Type your answer here... computers are for both business and personal use. we use computers in almost eveyrhing that a human being can do now. we use them to be able to communicate. the whole world is computerized. but the difference between personal and professional use of a computer is what is important, and sometimes computer is just for fun or entertainment. others use it for business. the deal with a computer is it is different from a telephone or in person communication or regular mail, because no one has to read their email or receive it and with it being a machine nothing is perfect in communicating that way because noone can see facial expression or anyone of those things when somene is writing with communication on a computer and there is a lot of possiblities for errors or miscommunications to take place.

What is the difference between computer ethics and computer law?

Probably the simplest way to differentiate between ethics and law is the consequences of violating them. If you are unethical, you might get sued but may not go to jail. There are typically no criminal penalties for not adhering to reasonable computer ethics codes. Computer law, on the other hand, usually carries criminal penalties if you violate them - including potential imprisonment, fines, and seizure of assets. Those violating computer laws may also be forbidden to possess or access computer systems as part of their penalties or parole conditions.

Can someone post private emails on a website without permission including personal information contained within the email ie like workplace etc?

The laws governing posting private information (including emails) to a web site are pretty much the same as they would be for publishing them in a newspaper or in a book. If the email was sent to you, you _may_ be able to post it without permission from the person who sent it. If you got the information through dishonest or deceptive means - you can get in trouble for posting it. If there is an implied expectation of privacy, you cannot post it. If it was provided as part of an information request - like applying for a job - it can only be used for that purpose, and not re-posted. If it was provided in answer to an interview question - where the interview is expected to be published, then - yes - you can post it. If it was stated to be 'off the record' you probably cannot post it.

As a general rule of thumb - if the person who sent the email had no reason to expect the information to be made public, don't post it.

Need address for Experian due to disputes need to contact you?

If you have reviewed your credit report and found some data to be inaccurate, the fastest way to resolve the errors is online. The address for the Experian web site is in the attached link.

Trending Questions
In a defense of depth strategy what could be done? What covers DIACAP states that the IA posture of an organization will be reviewed every two years? What is allowed IAW AR 25-2? Does ditscap supersedes diacap? In accordance with AR 25-2 whose responsibility is it to ensure all users receive initial and annual IA awareness training? What 3 laws have had a significant effect on information security in the U S? Which of the following is allowed IAW AR 25-2? Our source of DIACAP resources and knowledge services can be discovered through our relationship and support from? What is the BitLocker used for? . In which DoD Directive would you find guidance for the training certifications and workforce management of the DoD Information Assurance workforce? What certifications would satisfy DODI 8570 for IAM level l and IAM level lll? Is it legal for schools to keep a cell phone for 9 weeks? What AR 25-2 requires to all users? What is statutory compliance? Who is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager with the support authority and resources to satisfy the reponsibilities? Jim your organizations IAM has been contacted by the program manager to assist in implementing the DIACAP Jim is not required to assist the PM in this activity and should pass this activity off to? What document requires the IASO to ensure personnel receive system-specific and annual IA awareness training? The dod instuction which covers diacap states that the ia posture of an organization? Are The Record Managers must know the Soldier's SSN to search for their record? Documents requires the IASO?