Are rules that mandate or prohibit certain behavior and are enforced by the government?

Rules that mandate or prohibit certain behavior and are enforced by the state.

An entity’s legal obligation or responsibility.

The fixed moral attitudes or customs of a particular group.

The branch of philosophy that considers nature, criteria, sources, logic, and the validity of moral judgement.

A legal requirement to make compensation or payment resulting from a loss or injury.

Measures that an organization takes to ensure every employee knows what is acceptable and what is not.

The ability of a legal entity to exercise its influence beyond its normal boundaries by asserting a connection between an out of jurisdiction entity and a local legal case.

The power to make legal decisions and judgements; typically an area within which an entity such as a court or law enforcement agency is empowered to make legal decisions.

Reasonable steps taken by people or organizations to meet the obligations imposed by laws or regulations.

In the context of information security, the right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality.

Guidelines that dictate certain behavior within the organization.

Pieces of nonprivate data that, when combined, may create information that violates privacy. Not to be confused with aggregate information.

Collective data that relates to a group or category of people and that has been altered to remove characteristics or components that make it possible to identify individuals within the group. Not to be confused with information aggregation.

The unauthorized taking of personally identifiable information with the intent of committing fraud and abuse of a person’s financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.

The affirmation or guarantee of the confidentiality, integrity, and availability of information in storage, processing, and transmission. This term is often used synonymously with information security.

The collection, analysis, and distribution of information from foreign communications networks for intelligence and counterintelligence purposes and in support of military operations. In recent years, the debate around the collection and use of signals intelligence has grappled with the integration of domestic intelligence gathering.

_______ are codes or principles on an individual or group that regulate and define acceptable behavior.

______ are rules that mandate or prohibit certain behavior and are enforced by governments.

______ _____ is the legal standard that requires a prudent organization and its employees to act legally and ethically and know the consequences of their actions.

Te_____ ______ requires that an organization make a valid attempt to continually maintain a level of legal and ethical behavior.rm

______ functions as organizational laws.

_____ laws govern a nation or state and deal with relationships and conflicts between organizations and people.

_____ law addresses activities and conduct harmful to society.

_____ law encompasses family law, commercial law and labor law.

____ law regulates the structure and administration of government agencies. It includes criminal, administrative and constitutional law.

The ________ Act is the cornerstone of many computer-related federal laws and enforcement efforts. (Name the law)

Computer Fraud and Abuse Act

The _________ Act was one of the first attempt to protect federal computer systems by establishing minimum acceptable security practices.

The ______ Act requires all federal agencies to establish information security programs to protect their information assets. (Name the law)

Federal Information Security Management Act

The ______ Section of the common carrier regulation act states that any proprietary information shall be used explicitly for providing services and not for marketing.

Privacy of Consumer Information

The _____ Act regulates government agencies and hold them accountable if they release private information.

The _____ Act is informally referred to as the wiretapping act.

Electronic Communications Privacy Act

_______ protects the confidentiality and security of healthcare data. (Name the law)

The __________ Act requires all financial institutions to disclose their privacy policies.

Financial Services Modernization Act

Identity theft is a large issue. According to a report from the U.S. Department of Justice _____ percent of all U.S. residents age 16 or older were victims of identity theft.

The _______ Act specifically addresses the malicious use of spyware or keyloggers to steal Personally identifiable information.

Identity Theft Enforcement and Restitution Act

The _______ Act provides guidance for the use of encryption and provides protection from government intervention.

Security and Freedom through Encryption Act

The _______ Act seeks to improve the reliability and accuracy of financial reporting.

The ______ are designed to enhance the security of customer's account data.

Payment Card Industry Data Security Standards

The _____ was the first significant international effort to protect intellectual property rights.

A 2011 study found that the global software privacy rate was _____ percent.

The _____ was "the world's first education and scientific computing society."

Association of Computing Machinery

For a policy to become enforceable, it must meet five criteria. What are they?

Dissemination, review, comprehension, compliance and uniform enforcement.

What is the difference between aggregate information and information aggregation?

Aggregate information is data that belongs to a group of people that has had components of the information removed so that it is hard to identify a certain member of the group. However, information aggregation is pieces of non-private data that, when combined, may create information that violates privacy regulations.

What 4 steps are recommended if you think you are a victim of identify theft?

- Report to the three dominant consumer reporting companies that your identity is threatened. - Close the compromised account and dispute accounts opened without permission. - Register your concern with the Federal Trade Commission. - Report the incident to either your local police or police in the location where the identity theft occurred.

What are the three general causes of unethical and illegal behavior?

Ignorance, Accident and Intent.

Laws, policies and their associated penalties only provide deterrences if three conditions are present. What are they?

- Fear of penalty - Probability of being caught - Probability of penalty being administered.

What are rules that mandate or prohibit certain behavior?

Laws are rules that mandate or prohibit certain behavior in society; they are drawn from ethics, which define socially acceptable behaviors. The key difference between laws and ethics is that laws carry the sanctions of a governing authority and ethics do not.

Are the fixed moral attitudes or customs of a particular group?

Ethics are based on cultural mores: relatively fixed moral attitudes or customs of a societal group.