chap 3 notes
chap 3 notes
Laws: These are rules created by the government to control behavior. Breaking the law
results in punishment, such as fines or jail time.
Ethics: These are moral rules about what is right and wrong. They are not enforced by law
but by social norms.
Cultural mores: These are customs and moral values specific to a group or society.
Example:
If someone hacks a system to steal data, it is illegal because laws prohibit it.
If someone secretly reads a colleague’s private email, it may not be illegal, but it is
unethical.
Policies: These are rules within an organization that define what employees can and cannot
do.
Policies work like laws within the workplace but do not apply outside the organization.
3. Comprehension (understanding): They should clearly know what the policy means.
Example:
A company has a policy against sharing passwords. If an employee shares a password, they
might be fired or warned, even though no law was broken.
3. Types of Law
o Example: If a company sells faulty software, a customer can sue for damages.
o Example: Hacking into a bank's system and stealing money is a criminal offense.
3. Private Law: Covers areas like family law, business law, and labor law.
o Example: A company firing an employee unfairly falls under labor law.
4. Public Law: Regulates how government agencies work and how they interact with citizens.
o Example: Laws that protect citizens’ personal data from government misuse.
The U.S. has several laws to protect information security. These laws ensure businesses are secure
and prevent misuse of technology.
1. Computer Fraud and Abuse Act (1986): The main law against hacking and online fraud.
Whether the crime was for financial gain or another criminal act.
Example:
If someone steals a company's customer database and sells it, they can be punished under
the CFA Act.
6. Privacy
Privacy means people and companies have the right to protect their personal information.
Example:
7. Identity Theft
Happens when someone steals your personal details (name, Social Security number, credit
card) to commit fraud.
Example:
If a hacker gets your bank details and uses them to make online purchases, that is identity
theft.
Example:
A company using strong encryption to protect customer data cannot be forced to share
encryption keys with the government.
Fair use allows small parts of copyrighted material to be used for education or research.
Financial Reporting Laws ensure companies report finances accurately.
Example:
Using a small paragraph from a book in a research paper is allowed (fair use).
Allows people to request government records unless they are related to national security.
Example:
A journalist can request public government documents but not private company data.
Example: Georgia's Computer Systems Protection Act (1991) protects against cyber attacks.
Example:
3. Follow laws.
Example:
A cybersecurity expert should not use their skills to hack systems for personal gain.