Jennifer Stisa Granick, Esq. Exec. Director, Center for Internet & Society Stanford Law School.
|
|
- Lydia Morgan
- 7 years ago
- Views:
Transcription
1 Jennifer Stisa Granick, Esq. Exec. Director, Center for Internet & Society Stanford Law School
2 Topics For Today 1. What are the state and federal laws regulating access to computer systems and how do these laws affect civil and governmental investigations of computer security breaches? 2. Is there a risk of civil or criminal liability for maintaining insecure computer systems? 3. Is reverse engineering legal? 4. What are trade secret laws? 5. How do license agreements affect reverse engineering and trade secrets? 6. What is the proper way to report security vulnerabilities? 7. How do I know when I need to talk to a lawyer?
3 Federal Law 18 USC 1030: Makes it a crime to access a computer without authorization and obtain information or cause damage.
4 State Law CA PC 502(c)(3):Knowingly and without permission uses or causes to be used computer services or (7) Knowingly and without permission accesses or causes to be accessed any computer, computer system, or computer network.
5 CFAA and Incident Investigation/Strike Back: 18 USC 1030(a)(5)(A)(i) : knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer.
6 Liability for Insecurity? Downstream victims Denial of Service Attacks: Zombie Computer Storage or Distribution Site for Copyright Infringing Materials Child Pornography or Obscenity Attack Tools
7 The Law of Reverse Engineering Is it a right? Protected by Fair Use Atari Games Corp. v. Nintendo of America, Inc., 975 F.2d 832 (Fed. Cir. 1992) Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, (9th Cir. 1992) Sony Computer Entm t, Inc v. Connectix Corp., 203 F.3d 596 (9th Cir. 2000)
8 Reverse Engineering DMCA Anti-circumvention provisions a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under this title.
9 EULAs and Reverse Engineering Bowers v. Baystate Blizzard v. BnetD
10 Trade Secret Law California s trade secret act prohibits the misappropriation of trade secrets. Misappropriation means acquisition by improper means, or disclosure without consent by a person who used improper means to acquire the knowledge.
11 Trade Secret Law and RE Reverse engineering is proper, not improper, means and is specifically allowed by California law. As used in this title, unless the context requires otherwise:(a) Improper means includes theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means. Reverse engineering or independent derivation alone shall not be considered improper means.
12 Trade Secret Law and EULAs Violation of an NDA is a trade secret violation. Violation of an End User License Agreement is a trade secret violation? Formation Issues A violation of a promise in a EULA is a violation of contract, but not an improper means of discovering a trade secret. Any limit to enforceability of EULA terms on other grounds?
13 Security Publication: Pros Public Awareness of Security Risks Enables SysOp Remediation Motivation for Vendor to Patch White Hats Know What Black Hats Know: No Security Through Obscurity
14 Security Publication: Cons Public Relations Nightmare: Relative Seriousness of Problem Window of Opportunity Before Patch Script Kiddies: Greatly Increases Potential Attackers
15 Security Publication Dual Nature: The same information that allows more widespread exploitation of vulnerabilities is required to correct those vulnerabilities.
16 Security Publication: Issues Security Through Obscurity vs. Script Kiddies Timing of Disclosure What to Disclose To Whom
17 Legal Liability? Negligence: Duty Not to Publish? Conspiracy: Agreement? Aiding and Abetting? Wire Fraud: Intent to Defraud? State Statutes? Digital Millennium Copyright Act Council of Europe Convention on CyberCrime
18 DMCA Prohibits Circumvention of Technological Measure that Effectively Controls Access to a Copyrighted Work Prohibits Manufacturing and Distribution of Any Technology (Tools) Primarily Designed for the Purpose of Circumventing Access Controls Limited Commercially Significant Purpose OR Marketed for Use in Circumvention
19 DMCA: Exceptions Security Testing Encryption Research Reverse Engineering
20 Security Testing Exception OK to access a computer network solely for the purpose of good faith testing and correcting a vulnerability, with authorization, if not an infringement or other violation of law Factors: information used solely to promote the security of the owner of the tested computer system, or information shared directly with the developer of the system AND information not distributed in a way that might enable copyright infringement or other legal violations Security tools OK if do not otherwise violate section (a)(2).
21 Encryption Research Exception Professional Cryptographers Seek Advance Permission Necessary to Advance the State of Knowledge in the Field Publishing Results Does Not Promote Infringement
22 Reverse Engineering Exception Purpose to Achieve Program-toprogram Interoperability Reverse Engineering Is Necessary Information Divulged for the Sole Purposes of Enabling Program-to- Program Interoperability
23 When to Talk to a Lawyer
24 Jennifer Stisa Granick, Esq. Center for Internet & Society Stanford Law School 559 Nathan Abbott Way Stanford, California USA +1 (650)
CHAPTER 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS
18 U.S.C. United States Code, 2010 Edition Title 18 - CRIMES AND CRIMINAL PROCEDURE PART I - CRIMES CHAPTER 121 - STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS CHAPTER 121
More informationLegal and Ethical Issues Facing Computer & Network Security Researchers
Legal and Ethical Issues Facing Computer & Network Security Researchers Aaron Burstein UC Berkeley School of Information November 23, 2009 Constraints on Network Research U.S. law is often unclear (and
More informationCompetitive Intelligence Acquisition and Reverse Engineering
Competitive Intelligence Acquisition and Reverse Engineering Pitfalls and Best Practices in the US, the UK and Germany Richard M. Assmus Andrea C. Hutchison Dr. Ulrich Worm May 20, 2010 Sangeeta Puran
More informationComputer Crime Year In Review: MySpace, MBTA, Boston College and More
Computer Crime Year In Review: MySpace, MBTA, Boston College and More Jennifer Stisa Granick, EFF Civil Liberties Director Kurt Opsahl, EFF Senior Staff Attorney Black Hat Briefings July 29, 2009 1 Topics
More informationClients Legal Needs in HIPAA Security Compliance
Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance
More informationInformation Security Law: Control of Digital Assets.
Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security
More informationBefore the U.S. COPYRIGHT OFFICE, LIBRARY OF CONGRESS
Before the U.S. COPYRIGHT OFFICE, LIBRARY OF CONGRESS In the matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies Docket No. 2014-07 Petition
More informationSources of Protection For Prohibit Information
Introduction to Corporate Information Security Law Andrea M. Matwyshyn a-matwyshyn@law.northwestern.edu Adjunct Professor of Law, Northwestern University Affiliate, Manufacturing and Technology Policy
More informationDo Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective
Trade Secret Protection vs. Free Speech Do Bloggers have special rights to disclose Trade Secrets? - The Trade Secret Owner s Perspective Marc Martin, Partner K&LNG Any opinions, interpretations or viewpoints
More informationHTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications
Page 1 of 5 HTC Communications ACCEPTABLE USE POLICY FOR HIGH SPEED INTERNET SERVICE This Acceptable Use Policy ( AUP ) governs high speed Internet service provided to you by HTC Communications (together
More informationAcceptable Use Policy of UNWIRED Ltd.
Acceptable Use Policy of UNWIRED Ltd. Acceptance of Terms Through Use This site provides you the ability to learn about UNWIRED and its products and services as well as the ability to access our network
More informationFKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
More informationService Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5
WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds
More informationStored Wire and Electronic Communication and Transactional Records Access. Table of Contents
United States Secret Service Directives System Stored Wire and Electronic Communication and Transactional Records Access Table of Contents Introduction 1 Definition 1 Disclosure of Communication or Records
More informationCyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014
Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A. Puplava
More informationShady RATs, Topiaries, and Other Curious Creatures: A Lawyer's Look at InfoSec 2011
Shady RATs, Topiaries, and Other Curious Creatures: A Lawyer's Look at InfoSec 2011 Presented by: Melissa L. Markey, Esq. Hall, Render, Killian, Heath & Lyman, PLLC 201 West Big Beaver Rd, Suite 1200 Troy,
More informationPEER-TO-PEER FILE SHARING POLICY
1.0 Overview The purpose of this Policy is to detail the University s plans to effectively combat the unauthorized distribution of copyrighted material by users of the Information Technology Resources,
More informationCybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws
Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer
More informationLeveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies
Leveraging Business / Trade Secrets for Competitive Advantage: Examples and Case Studies Professor Prabuddha Ganguli Advisor, VISION-IPR & Adjunct Professor, SJM School of Management, Indian Institute
More informationPLEASE READ. The official text of New Jersey Statutes can be found through the home page of the New Jersey Legislature http://www.njleg.state.nj.
PLEASE READ The official text of New Jersey Statutes can be found through the home page of the New Jersey Legislature http://www.njleg.state.nj.us/ New Jersey Statutes Annotated (N.J.S.A.), published by
More informationACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX )
ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; WWW.BROADVOX.COM; WWW.BROADVOX.NET (COLLECTIVELY BROADVOX ) 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer
More informationPROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART
PROTECTING THE COMPANY S CROWN JEWELS WHEN EMPLOYEES DEPART Michael G. King, Esq. (mking@hgla.com) Paul T. Martin, Esq. (pmartin@hgla.com) 4640 Admiralty Way Suite 850 Marina del Rey, CA 90292 (310) 305-2100
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationRequest for Comments on Section 1201(g) of the Digital Millennium Copyright Act COMMENTS OF THE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION (CCIA)
DEPARTMENT OF COMMERCE National Telecommunications and Information Administration LIBRARY OF CONGRESS Copyright Office [Docket No. 990428110-9110-01] RIN 0660-ZA09 Request for Comments on Section 1201(g)
More informationGRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf
GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference
More informationService Protection Under The Provider's Acceptable Use Policy
Acceptable Use Policy As a provider of Internet access, Internet email, web site hosting, and other Internet related services, Pottawatomie Telephone Company and MBO.net herein after referred to as "the
More informationTJ RAI, M.D. THERAPY MEDICATION WELLNESS PRIVACY POLICY STATEMENT
PRIVACY POLICY STATEMENT Purpose: It is the policy of this Physician Practice that we will adopt, maintain and comply with our Notice of Privacy Practices, which shall be consistent with HIPAA and California
More informationProfessional. Compliance & Ethics. 49 Ethics Bowl: Teaching ethical reasoning to students. 59 The global language of ethical values
Compliance & Ethics September 2014 Professional a publication of the society of corporate compliance and ethics www.corporatecompliance.org Compliance and Ethics at Walmart an interview with Cindy Moehring
More informationPeopleMatrix Application Hosting Services Agreement
PeopleMatrix Application Hosting Services Agreement WolfeReiter, LLC CONTENTS 1. Services Agreement... 2 1.1. Description of Services... 2 1.2. Term... 2 1.3. Customer Responsibilities... 2 1.4. Payment
More informationSan Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX
San Antonio Police Department FORGERY DETAIL 315 S. Santa Rosa SAN ANTONIO, TX 78207 (210)-207-7451 OFFICE (210)-207-4070 FAX Identity Theft Packet SAPD case # Assigned Detective: The San Antonio Police
More informationData Breaches, Hacks and Vulnerabilities: Leading Strategies for Responding to a Data Breach
Data Breaches, Hacks and Vulnerabilities: Leading Strategies for Responding to a Data Breach Presented by: S. Ashlie Beringer, Karl G. Nelson, Alexander H. Southwell February 29, 2012 Agenda Data Security
More informationFOR ACCESS CONTROL TECHNOLOGIES Docket No. 2014-07
BEFORE THE UNITED STATES COPYRIGHT OFFICE LIBRARY OF CONGRESS PETITION OF A COALITION OF MEDICAL DEVICE RESEARCHERS FOR EXEMPTION TO PROHIBITION ON CIRCUMVENTION OF COPYRIGHT PROTECTION SYSTEMS Submitted
More informationCredit Reports and the Fair Credit Reporting Act. The Credit Bureaus
Credit Reports and the Consumer Law Eric E. Johnson eejlaw.com Konomark Most rights sharable. The Credit Bureaus 1 State law causes of action against credit bureaus Defamation Invasion of privacy State
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES
INFORMATION SECURITY & PRIVACY INSURANCE WITH BREACH RESPONSE SERVICES NOTICE: INSURING AGREEMENTS I.A., I.C. AND I.D. OF THIS POLICY PROVIDE COVERAGE ON A CLAIMS MADE AND REPORTED BASIS AND APPLY ONLY
More informationReducing the Cost and Complexity of Web Vulnerability Management
WHITE PAPER: REDUCING THE COST AND COMPLEXITY OF WEB..... VULNERABILITY.............. MANAGEMENT..................... Reducing the Cost and Complexity of Web Vulnerability Management Who should read this
More informationCONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA
CONCERNS WITH THE LEAKED INTERNET CHAPTER OF ACTA The U.S. proposal for an Internet chapter in the Anti-Counterfeiting Trade Agreement (ACTA) has been leaked to the press and widely disseminated on the
More informationregion16.net Acceptable Use Policy ( AUP )
region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply
More informationWHISTLE BLOWING POLICY & PROCEDURES
Management Circular No: GCSL/01.2013 Revised: 01/2014 WHISTLE BLOWING POLICY & PROCEDURES All rights reserved. No part contained in this Policy may be reproduced or copied in any form without the written
More informationFusion Acceptable Use Policy. Effective Feb 2, 2015
Fusion Acceptable Use Policy Effective Feb 2, 2015 1. ACCEPTANCE OF TERMS THROUGH USE This website (the Site ) provides you (the Customer or Customer s end users) the ability to learn about Fusion and
More informationFEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE
FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE FEDERAL CIVIL FALSE CLAIMS ACT The federal civil False Claims Act, 31 U.S.C. 3729, et seq., ( FCA ) was originally enacted in 1863 to combat fraud perpetrated
More informationNo. 03 Civ. 2183(NRB). Feb. 23, 2004. * * * MEMORANDUM AND ORDER
307 F.Supp.2d 521 United States District Court, S.D. New York. I.M.S. INQUIRY MANAGEMENT SYSTEMS, LTD., Plaintiff, v. BERKSHIRE INFORMATION SYSTEMS, INC., Defendant. BUCHWALD, District Judge. No. 03 Civ.
More informationProtecting Trade Secrets: Best Practices for New and Departing Employees
NOVEMBER 6, 2014 Protecting Trade Secrets: Best Practices for New and Departing Employees Robert S. Shwarts What is Intellectual Property? Trade Secrets Trademarks / Trade Dress Copyrights Patents 2 Trade
More informationLabor and Employment 2015 Conference
Labor and Employment 2015 Conference Investigations and Whistleblowing: How to Proceed When an Investigation Reveals Criminal Conduct or Other Improprieties Abigail Crouse Associate General Counsel RJ
More informationJune 10, 2010. 2010 Legislative Amendments to the Indiana Code Relating to First Lien Mortgage Act (the Act )
June 10, 2010 2010 Legislative Amendments to the Indiana Code Relating to First Lien Mortgage Act (the Act ) Effective July 1, 2010 (except as otherwise indicated) Questions, Answers, and Administrative
More informationNorth Carolina General Statutes Chapter 75 Monopolies, Trusts, and Consumer Protection Article 2A Identity Theft Protection Act
North Carolina General Statutes Chapter 75 Monopolies, Trusts, and Consumer Protection Article 2A Identity Theft Protection Act 75-60. Title. This Article shall be known and may be cited as the "Identity
More informationAcceptable Usage Policy Internet Service Provider / Customer Agreement
Acceptable Usage Policy Internet Service Provider / Customer Agreement In order to begin service, you must review the following terms and conditions governing MOKAN COMMUNICATIONS INC s Internet Access
More informationLexisNexis Public Access Portal: www.lexisnexis.com/njoal
PLEASE READ Rules and regulations of the Division of Consumer Affairs, the boards and committees in, and other units of, the Division are codified in Title 13 of the New Jersey Administrative Code, published
More informationLeonard W. Vona, CPA, CFE
Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: lwvcfe@aol.com Part of an auditor s job is
More informationINFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE. I. GENERAL INFORMATION Full Name:
INFORMATION SECURITY AND PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY COVERAGE NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST MADE
More informationCommercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
More informationPrepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014
Prepare for the Worst: Best Practices for Responding to Cybersecurity Breaches Trivalent Solutions Expo June 19, 2014 2014, Mika Meyers Beckett & Jones PLC All Rights Reserved Presented by: Jennifer A.
More informationINFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION
INFORMATION SECURITY & PRIVACY INSURANCE WITH ELECTRONIC MEDIA LIABILITY APPLICATION NOTICE: COVERAGE UNDER THIS POLICY IS PROVIDED ON A CLAIMS MADE AND REPORTED BASIS AND APPLIES ONLY TO CLAIMS FIRST
More informationmaintain and enforce on its user clients an acceptable use policy similar in scope and intent to this Acceptable Use Policy.
CTC Acceptable Use Policy Consolidated Telephone Company doing business as Consolidated Telecommunications Company (CTC) has adopted this Acceptable Use Policy to encourage the use of its network and services
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationThe Do s and Don ts of Utilizing Social Media in Claims Investigation
The Do s and Don ts of Utilizing Social Media in Claims Investigation Benjamin R. Messing, Esquire 2012 SIR Annual Conference October 15, 2012 Nelson Levine de Luca & Hamilton, LLC Understanding Social
More informationBUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
More informationCalifornia Mutual Insurance Company Code of Business Conduct and Ethics
California Mutual Insurance Company Code of Business Conduct and Ethics This Code of Business Conduct and Ethics (the Code ) applies to all officers, employees, and directors of California Mutual Insurance
More informationH. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.
F:\SLS\SLS_.XML 0TH CONGRESS D SESSION H. R. To amend titles and, United States Code, to strengthen the protection of intellectual property, and for other purposes. IN THE HOUSE OF REPRESENTATIVES M. introduced
More informationAcceptable Use Policy
Acceptable Use Policy PLEASE READ THIS AGREEMENT CAREFULLY BEFORE ACCESSING THE SERVICE. BY ACCESSING THE SERVICE YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT WISH TO BE BOUND
More informationIntellectual property protection for trade secrets and know-how
Intellectual property protection for trade secrets and know-how Thomas Duston and Thomas Ross Marshall, Gerstein & Borun, Chicago, IL A trade secret is virtually anything that is secret, and that imparts
More informationAcceptable Use Policy
Acceptable Use Policy Department of Information Technology Olivet Nazarene University (815) 939-5302 Published August 2013 Ver. 4.0 Policy Overview 1. Executive Summary This summary is intended to present
More informationCYBER SECURITY A L E G A L P E R S P E C T I V E
A L E G A L P E R S P E C T I V E T H O M A S G. S C H R O E T E R A S S O C I A T E G E N E R A L C O U N S E L P O R T O F H O U S T O N A U T H O R I T Y DISCLAIMER! This presentation: does not include
More informationCODE OF ETHICS AND BUSINESS CONDUCT
CODE OF ETHICS AND BUSINESS CONDUCT Date of Issue: 22 January 2015 Version number: 2 LUXFER HOLDINGS PLC Code of Ethics and Business Conduct Luxfer Holdings PLC is committed to conducting its business
More informationa. employees Company; or
Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged
More informationNavigating the New MA Data Security Regulations
Navigating the New MA Data Security Regulations Robert A. Fisher, Esq. 2009 Foley Hoag LLP. All Rights Reserved. Presentation Title Data Security Law Chapter 93H Enacted after the TJX data breach became
More informationBOBCAT COMPUTING POLICY
BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,
More informationTexas Medical Records Privacy Act
A COALFIRE PERSPECTIVE Texas Medical Records Privacy Act Texas House Bill 300 (HB 300) Rick Dakin, CEO & Co-Founder Rick Link, Director Andrew Hicks, Director Overview The State of Texas has pushed ahead
More informationAcceptable Usage Policy
Contents 1. INTRODUCTION... 2 2. PURPOSE... 2 3. APPLICATION... 2 4. YOUR OBLIGATIONS AND PROHIBITED USE... 2 5. SPAM... 3 6. EXCESSIVE USE... 3 7. SECURITY... 4 8. COPYRIGHT... 4 9. CONTENT... 4 10. REGULARTORY
More informationCYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below
More informationWorkers Compensation Fraud
Workers Compensation Fraud Martin Gonzalez Chief Investigator CA Department of Insurance Fraud Division 5999 E. Slauson Ave. Commerce, CA 90040 (323) 278-5000 1 State of California Department of Insurance
More informationForeign Corrupt Practices Act ( FCPA )
Foreign Corrupt Practices Act ( FCPA ) OVERVIEW The Foreign Corrupt Practices Act ( FCPA ) was passed in 1977 in an effort to address concerns over the integrity of U.S. markets after hundreds of U.S.
More informationUGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE
1. DISCLAIMER NOTICE UGANDA REVENUE AUTHORITY TERMS AND CONDITIONS FOR WEB PORTAL USE The information provided by UGANDA REVENUE AUTHORITY (URA) on the web portal relating to products and services (or
More informationLaw & Ethics, Policies & Guidelines, and Security Awareness
Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of
More informationIdentity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota
1 Identity Theft Regulation *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota (605) 455-6110 csarmiento@olc.edu Introduction This
More informationPlease see Section IX. for Additional Information:
The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) BILL: CS/CS/SB 222 Prepared By:
More informationCYBERCRIME LAWS OF THE UNITED STATES
CYBERCRIME LAWS OF THE UNITED STATES United States Code, Title 18, Chapter 121 STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL RECORDS ACCESS 2701. Unlawful access to stored communications
More informationZurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
More informationCHAPTER 14. Criminal Activities Potentially Affecting State Government. 14.3.1 Threatening, Intimidating, or Harassing
CHAPTER 14 DETECTION OF CRIMINAL VIOLATIONS Table of Contents Section 14.1 Scope of this Chapter 14.1.1 Introduction Section 14.2 Section 14.3 Reporting of Crimes Criminal Activities Potentially Affecting
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More informationAnti-bribery and Fraud Protection Policy
Anti-bribery and Fraud Protection Policy Dear Colleagues and Partners, Carbo One Limited is one of the largest coal trading companies in the market and the nature of its business requires interaction with
More informationAcceptable Use (Anti-Abuse) Policy
Acceptable Use (Anti-Abuse) Policy This document describes the Acceptable Use Policy for the Rightside registry. Copyright 2014 Rightside Registry Copyright 2014 Rightside Domains Europe Ltd. Rightside
More information2014 Federation of Tax Administrators Annual Meeting St. Petersburg, FL
2014 Federation of Tax Administrators Annual Meeting St. Petersburg, FL Third-party Enforcement Actions Infringement on Tax Administration & Tax Policy Marilyn A. Wethekam Brian Hamer Horwood Marcus &
More informationZIMPERIUM, INC. END USER LICENSE TERMS
ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side
More informationEvolution of HB 300. HIPAA passed in 1996 Originally, HIPAA only directly impacted certain covered entities :
Texas HB 300 HB 300: Background Texas House Research Organizational Bill Analysis for HB 300 shows state legislators believed HIPAA did not provide enough protection for private health information (PHI)
More informationRiverside Community College District Policy No. 7700 Human Resources
Riverside Community College District Policy No. 7700 Human Resources BP 7700 WHISTLEBLOWER PROTECTION References: California Labor Code Section 1102.5; Government Code Section 53296; Private Attorney General
More informationNew Hampshire Statutes Title 31 Trade and Commerce Chapter 359-B Consumer Credit Reporting
New Hampshire Statutes Title 31 Trade and Commerce Chapter 359-B Consumer Credit Reporting 359-B:22 Definitions. In this subdivision: I. "Identity theft" means the unauthorized taking or use of an individual's
More informationPolicy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
More informationSTAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES
STAR TELEPHONE MEMBERSHIP CORPORATION ACCEPTABLE USE POLICY FOR BROADBAND INTERNET SERVICES Star has adopted this Acceptable Use Policy ( AUP ) to outline the acceptable use of Star s Broadband Internet
More informationUNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014
I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,
More informationT-CY Guidance Note #5
www.coe.int/tcy Strasbourg, 5 June 2013 T-CY (2013)10E Rev Cybercrime Convention Committee (T-CY) T-CY Guidance Note #5 DDOS attacks Adopted by the 9 th Plenary of the T-CY (4-5 June 2013) Contact: Alexander
More informationTerms of Submission In order to participate, you must be at least eighteen (18) years old.
Terms of Submission NBCUniversal Media, LLC company ( NBCU ) located at 30 Rockefeller Plaza, New York, NY 10112, invites you to join in on the fun with The Tonight Show Starring Jimmy Fallon (the Show
More informationLiability of Internet Service Providers
Liability of Internet Service Providers Tsuneaki Hagiwara Manager of the Legal Department, Toppan Printing Co., Ltd. 1. U.S. Rules Limiting Liability of Internet Service Providers (1) Copyright Infringement
More informationCHAPTER 226. C.56:11-44 Short title. 1. This act shall be known and may be cited as the "Identity Theft Prevention Act."
CHAPTER 226 AN ACT concerning identity theft, amending P.L.1997, c.172 and supplementing various parts of the statutory law. BE IT ENACTED by the Senate and General Assembly of the State of New Jersey:
More informationCYBERCRIME AND THE LAW
CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national
More informationWritten: 1/09/07 Federal and State Reviewed: 3/15/12 False Claims Act Revised: 06/13/12 Page: 1 of 5
Policy and Procedure Manual ADMINISTRATIVE SECTION --- III PATIENT RIGHTS & ORGANIZATIONAL ETHICS COMPLIANCE DEPARTMENT - COMPLIANCE Written: 1/09/07 Federal and State Reviewed: 3/15/12 False Claims Act
More informationComputing and Communication Policy on Acceptable Use of Electronic Resources
Computing and Communication Policy on Acceptable Use of Electronic Resources Summary This policy defines the boundaries of "acceptable use" of electronic resources, including computers, networks, electronic
More informationINTEGRATED BAR OF THE PHILIPPINES COMMISSION ON BAR DISCIPLINE GUIDELINES FOR IMPOSING LAWYER SANCTIONS A. PURPOSE AND NATURE OF SANCTIONS
INTEGRATED BAR OF THE PHILIPPINES COMMISSION ON BAR DISCIPLINE GUIDELINES FOR IMPOSING LAWYER SANCTIONS A. PURPOSE AND NATURE OF SANCTIONS 1.1 Purpose of Lawyer Discipline Proceedings The purpose of lawyer
More informationInject Design General Terms & Conditions
Inject Design General Terms & Conditions Latest Revision: April 2015 www.injectdesign.co.nz Content No. Contents Page No. 00 01 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 General Terms & Conditions
More information