CSE 4482 Computer Security Management: Assessment and Forensics. Law and Ethics

Size: px
Start display at page:

Download "CSE 4482 Computer Security Management: Assessment and Forensics. Law and Ethics"

Transcription

1 CSE 4482 Computer Security Management: Assessment and Forensics Law and Ethics Instructor: N. Vlajic, Fall 2013

2 Required reading: Management of Information Security (MIS), by Whitman & Mattord Chapter 12, pp

3 Learning Objectives Upon completion of this material, you should be able to: Differentiate between law and ethics. Identify major US laws that relate to the practice of information security. Identify relevant professional organizations and their Codes of Ethics.

4 Introduction

5 Introduction (cont.) Law written rules adopted & enforced by a government to define expected behavior these rules attempt to balance individual freedoms and social order, which may be in conflict laws are largely drawn from the ethics of a culture Ethics informal set of values and beliefs about right and wrong behavior some ethics are thought to be universal murder, theft, assault are legally and ethically unacceptable in most world s cultures Key difference between law and ethics: law caries the sanction of a governing authority and ethics do not!

6 Introduction (cont.) In majority of cases, what is legal is also ethical and the other way around. However, with the society operating a dynamic and ever-changing environment, there are cases when law and ethics are in conflict.

7 Introduction (cont.) Relationship between Law and Ethics Edward Snowden NSA Leak Case Breaking into Somebody s Account Screening of Web-traffic by Employer Harcourt%20Colledge%20Publishers-Donald%20F.%20Kuratko/chapter_6.htm

8 Introduction to Law

9 Introduction to Law Categories of Law in Canada and USA: Public Law(s): regulate 1) organization and functioning of the state 2) relationship between the state and its subjects concerned with matters that affect society as a whole deals with regulation of behavior generally Private Law(s): regulate relationship between individuals and groups that are not of public importance deals with disputes between parties regulates rights and duties of individuals to each other

10 Introduction to Law Subcategories of Law Public Law(s) Constitutional Law related to interpretation & application of the Constitution of Canada, including the Charter of R&F (freedom of expression & religion, freedom from unreasonable search & seizure, ) Administrative Law addresses actions and operations of government & government agencies Criminal Law deals with behaviors that results in injury to people and/or property (murder, break and enter, sexual assault, etc.) Private / Civil Law(s) Family Law deals with various relationships of family life Contract Law outlines requirements for legally binding agreements Tort Law seeks compensation for loss caused by negligence Property Law outlines relationship between individuals & property Labour Law outlines relationship between employers & employees

11 Criminal vs. Civil Law Case Criminal Law Procedure the victim (may) report the case to the police & they have the responsibility to investigate if charge has been properly laid & there is supporting evidence the Crown Prosecutor represents the case in the courts and public funds finance these services even if a victim starts a prosecution privately, the Attorney General has the power to take over the prosecution Civil Law Procedure the victim must take action to get a legal remedy or adequate compensation victim must hire a private lawyer & pay expenses of pursuing the matter the police does not get involved, beyond the point of restoring the order

12 Criminal vs. Civil Law Case (cont.) Criminal vs. Civil Law Principles In Criminal Law, to convict someone, the guilt must be proven beyond reasonable doubt. In Criminal Law, the sentence to the offender may include one or a combination of the following: fine restitution compensate for victim s loss or damages probation community service imprisonment In Civil Law, to convict someone, the guilt must be proven on balance of probabilities. In Civil Law, monetary remedies (damages) are most common.

13 Criminal vs. Civil Law Case (cont.) beyond reasonable doubt evidence = = clear and convincing evidence ( merely possibility that what is presented is true is not sufficient) balance of probabilities evidence = = evidence with 50% threshold (produces a belief that what is presented is more likely true than not true) More evidence is needed to find the defendant at fault in criminal than in civil ones.

14 Criminal vs. Civil Law Case (cont.)

15

16 Criminal vs. Civil Law Case (cont.) Every crime has two essential parts: the action or "actus reus" and the intent or "mens rea" (guilty mind). For example, the crime of arson has two parts: actually setting fire to a building and doing it wilfully and deliberately. Setting a fire by accident may not be a crime. For most criminal cases both the action and the intent must be proven. If either element is missing, then no crime has been committed.

17 Law and Computer Security attacker victim Is a DDoS a Civil or a Criminal offence? In US, as of 2008, DDoS is considered a criminal offence under Computer Misuse Act. In Canada, DDoS is also a criminal offence under Criminal Code 430: Unauthorized Use of Computer & Mischief.

18 Law and Computer Security (cont.) In the early days of computer security, information security professionals were pretty much left on their own to defend their systems against attacks. They did not have much help from the criminal and civil justice systems. When they did seek assistance from law enforcement, they were met with reluctance by overworked agents who did not have a basic understanding of how something that involved a computer could actually be a crime Fortunately, both our legal system and the man and women of law enforcement have come a long way over the past two decades CISSP: Certified Information Systems Security Professional Study Guide, by J. M. Steward, E. Tittel, M. Chapple (pp. 630)

19 Law and Computer Security (cont.) The first computer security issues addressed by legislators were those involving computer crime. Early computer crime prosecutions were attempted under traditional criminal law, and many were dismissed because judges thought that applying traditional law to this modern type of crime was too far of a stretch. Example: Hearsay evidence! Legislators responded by passing specific statutes that defined computer crime and laid out specific penalties for various crimes Every information security professional should have basic understanding of the law as it relates to information technology. However, the most important lesson to be learned is knowing when it is necessary to call in an attorney CISSP: Certified Information Systems Security Professional Study Guide, by J. M. Steward, E. Tittel, M. Chapple (pp. 633)

20 Law and Computer Security (cont.) To minimize their & their organization s liability, information security professionals must: keep informed about new laws, regulations and ethical issues as they emerge understand the scope of organization s legal and ethical responsibilities educate the management and employees about their legal and ethical obligations and the proper use of information technology

21 Computer Crime Computer Crime criminal activity in which either (aka Cybercrime) of the following is true: computer is a target e.g., somebody attempts to control a computer or interfere with its availability (examples: development and distribution of malware, DDoS attacks, ) computer is a storage device e.g., somebody uses a computer to store stolen or inappropriate content computer is a communication tool e.g., somebody uses computer(s) to conduct illegal sale of drugs or guns

22 Convention on Cybercrime Cybercrime 1 st international agreement seeking to Convention address Computer/Cyber Crimes by (2001) harmonizing national laws & increasing inter-national cooperation initially drawn up by the Council of Europe and active participation of Canada & Japan in 2006, USA became the 16 th nation to ratify the treaty currently, 40 states had ratified, and 11 states had signed (but not ratified) the convention Canada one of them

23

24

25 List of cybercrimes cited in the Convention on Cybercrime represents an international consensus on what constitutes cybercrime and what crimes are considered important. Stallings, Computer Security, 2 nd edition, pp. 596

26 US Laws Key US laws of interest to IS professionals

27 US Laws (cont.) INSTITUTIONS STATE Computer Fraud & Abuse Act Patriot Act Federal Privacy Act Electronic Communications Privacy Act INDIVIDUAL Health Insurance Portability and Accountability Ac Gramm-Leach-Bliley Act Children s Online Privacy Protection Act

28 US Laws: CFA Act Computer Fraud law passed by the US Congress and Abuse Act landmark in the fight against cyber- (CFA Act) crime the first law to address crime of 1986 involving computers initially intended to address offenses to computers of the US government and certain financial institutions amended in 1988, 1994, 1996 and 2001 by the USA Patriot Act through amendments, the scope extended to all protected computers, i.e. any computer connected to the Internet

29 US Laws: CFA Act (cont.) criminal offences under the CFA Act: 1) knowingly accessing a computer without authorization 1 or exceeding authorized access 2 to obtain national security data 2) intentionally accessing a computer without authorization (or 2 ) to obtain one of the following: a) a financial record of a financial institution; b) information from any US-government department or agency; c) information from any protected computer. 3) intentionally accessing without authorization (or 2 ) a government computer and affecting the use of the government s operation of the computer 4) knowingly causing the transmission of a program, information, code or command that causes damage such as: a) loss to one or more persons (or companies) during any one-year period aggregating at least $5,000 in value

30 US Laws: CFA Act (cont.) criminal offences under the CFA Act (cont.) b) the modification or impairment of medical records c) physical injury to any person d) a threat to public health of safety e) damage affecting a government computer system 5) knowingly and with intent to defraud traffics a password or a similar information through which a computer may be accessed without authorization 1 Access without authorization = access by an outsider who breaks in and uses a computer for any malicious purpose 2 Exceeding authorized access = access by an authorized user who obtains or alters information that he/she is not allowed to obtain or alter (e.g. employees)

31 US Laws: CFA Act (cont.) Computer Fraud although the Act does not specifically and Abuse Act mention hacking, malware and (cont.) denial of service, they are its main focus example: 1) knowing transmission of a code that causes damage infection by a virus 2) knowing execution of a command that causes damage DDoS attack Punishment for offences prosecuted under the CFA varies from fines to imprisonment of up to 20 years, or both.

32 US Laws: CFA Act (cont.) Case Study: Morris Case (1988) One of the first cases prosecuted under the CFA Act. Morris, a Ph.D. candidate in CS (Cornell U), wanted to demonstrate the weakness of security measures of computers on the Internet, a network linking university, government and military computers around the United States. His plan was to insert a worm into as many computers as he could gain access to, but to ensure that the worm replicated itself slowly enough that it would not cause the computers to slow down or crash. However, Morris miscalculated how quickly the worm would replicate. By the time he released a message on how to kill the worm, it was too late: Some 6,000 computers had crashed or become "catatonic" at numerous institutions, with estimated damages of $200 to $53,000 for each institution. Morris was sentenced to three years probation and 400 hours of community service, and was fined $10,500.

33 US Laws: Patriot Act US Patriot Act allows law enforcement greater (2001 weeks latitude in combating criminals after Sept. 11) and terrorists who use computers and communication networks [telephone, computer, wireless] L.E. has authority to intercept voice communications in computer hacking investigations L.E. has authority to obtain voice mail and other stored voice communications using standard search warrants rather than wiretap orders L.E. has authority to trace communications on the Internet and other computer networks

34 US Laws: Patriot Act (cont.) US Patriot Act (2001 weeks after Sept. 11) L.E. has authority to issue nationwide search warrants for s and other electronic data ISPs compelled to disclose unopened s ISPs are permitted to disclose customer info in the case of emergency - if they suspect an immediate risk of death or serious physical injury to any person Patriot Act one of the most controversial acts gives away personal freedoms and constitutional rights in exchange for higher levels of (national) safety For more see:

35 US Laws: Patriot Act (cont.) Case Study: Patriot Act vs. Constitution (2004) While conducting surveillance of the defendant and co-defendant, the agents lost track of them. The agents then dialed the defendant s cell phone several times, and used the provider s computer data to determine which cell transmission towers were being hit by that phone. The cell s data revealed the defendant s general location and helped catch him. On appeal of his conviction, the defendant argued that the cell-site data and resulting evidence should have been suppressed because they turned his phone into a tracking device and that violated his constitutional rights The court found that the cell-site data falls under the category of electronic communication, hence was not illegal Computer Forensics: Principles and Practices, pp. 423 by L. Volonino, R. Anzaldua, J. Godwin

36 US Laws: Privacy (1) Federal Privacy regulates the government s use Act (1974) of private information addresses concerns about creation and use of computerized data the act states: government agencies must protect the privacy of individuals and businesses information and are responsible if any portion of information is released without prior written consent of the individual at the same time, individuals CAN access information controlled by others if they can demonstrate that that information is necessary to protect their health & safety

37 US Laws: Privacy (2) Electronic Comm. often referred to as federal Privacy Act wiretapping act (1986) primarily designed to prevent unauthorized government access to private electronic communications sets high standards for search warrants of: wire, oral & electronic communications while in transit communications held in electronic storage dialing, routing, addressing & signaling information some provisions of the act are later weakened by Patriot Act

38 US Laws: Privacy (3) Health Insurance aims to protect confidentiality Portability and and security of health data Accountability requires organizations that retain Act - HIPAA health care information to use (1996) comprehensive information security mechanisms severely restricts dissemination & distribution of private health info without documented consent provides patients right to know who has access to and who has accessed their information gives patients the right to examine & obtain a copy of their own data

39 US Laws: Privacy (4) Gramm-Leach- contains a number of provisions -Bliley that affect banks, security firms, Act (1999) and insurance companies the act requires that such institutions: implement a comprehensive info. security program with appropriate administrative, technical and physical safeguards ensure the security and confidentiality of customer info., and protect customer info. from unauthorized access by third party that could result in harm or inconvenience to the customer Safeguarding the confidentiality and integrity of customer information is no longer just a best practice for financial institutions it is now a legal requirement.

40 US Laws: Privacy (4)

41 US Laws: Privacy (5) Children s Online prohibits certain actions by Privacy Protection websites and similar services Act COPP Act that are directed at children & (1998) by any site that may be visited by a person younger than 13 the act prohibits such sites from: collecting and using identifying info (name, postal code, address, SIN) from children under 13 unless they got verifiable parental consent registration requiring personal info as a requirement for playing games, applying for prizes, etc.

42 US Laws: Privacy Two key Canadian (federal) privacy laws: 1) The Privacy Act - imposes obligations on federal government departments and agencies to respect privacy rights by limiting the collection, use and disclosure of personal information. 2) Personal Information Protection and Electronic Document Act (PIPEDA) - sets out ground rules for how private sector organizations may collect, use or disclose personal information in the course of commercial activities.

43 trade secret = all forms and types of financial, business, scientific, technical, economic or engineering information that the owner has taken reasonable measures to keep secret and that is not known to the public US Laws: Export & Espionage (1) Economic attempts to prevent illegal sharing Espionage of trade secrets Act (1996) first federal law that defines trade secret and severely punishes any individual or organization that knowingly steals, copies, receives, buys or possesses trade secrets or conspires to do so penalties: fines up to $500,00 or 15 years in prison (or both) for individuals, and fines of up to $10 million for organizations

44 US Laws: Export & Espionage (2) Security And provides guidance on the use of encryption, and provides measures of protection from government intervention; specifically, the act Freedom Through Encryption Act (1999) relaxes restrictions concerning the sale and export of cryptographic products - used to be tightly controlled by the government states that the use of encryption is not probable cause to suspect a criminal activity - people can use encryption freely provides additional penalties for unlawful use of encryption in furtherance of a criminal act - e.g., with the intent to conceal a felony

45 US Laws: Copyright Laws No Electronic provides for criminal prosecution Theft Act of individuals who engage in (1997) copyright infringement prior to this act, criminal copyright infringement required that the infringement was for the purpose of commercial advantage or private financial gain merely downloading files on the Internet did not constitute a criminal activity the act permits the use of copyrighted material to support news reporting, teaching, as long as it is not for profit, and as long as proper acknowledgment is provided

46 US Laws: Sarbanes-Oxley Act Sarbanes- passed as a result of a series of financial Oxley Act scandals in 1990s (Enron, WorldCom) (2002) intended to protect general public from accounting errors & fraudulent practices puts far greater responsibility on the shoulder of corporate executives regarding: effective & efficient operation (including IT and Info Sec operation) reliable financial reporting and auditing compliance with applicable laws & regulations the act requires that all business documents (paper & electronic) must be kept for 5 years Canadian equivalent: Bill 198 (2003)

47 US Laws: Sarbanes-Oxley Act (cont.)

48 International Laws Info Sec related laws (may) vary considerably from one country to another. When organizations do business on the Internet, they do it globally; hence, it is important to be sensitive to the law and ethics values of different countries

49 Ethics Code of Ethics sets out general principles about an organization s beliefs on matters Code of Ethics Thou shall not Thou shall not Thou shall not such as mission, quality, privacy or environment effectiveness of such codes depend on the extent to which respective organizations support them with sanctions & rewards doctors and lawyers who violate ethical cannons of their professions could be removed from practice field Information Security (and IT) does not have a binding Code of Ethics instead, professional associations (ACM) and accreditation agencies ((ISC) 2, SANS) work to establish the professions codes of conduct

50 Ethics (cont.) 10 Commandments of Computer Ethics Institute (intended for IT community) 1. Thou shall not use a computer to harm other people. 2. Thou shall not interfere with other people s computer work. 3. Thou shall not snoop around in other people s computer files. 4. Thou shall not use a computer to steal. 5. Thou shall not use a computer to bear false witness. 6. Thou shall not copy or use proprietary software for which you have not paid. 7. Thou shall not use other people s computer resources without without authorization or proper compensation. 8. Thou shall not appropriate other people s intellectual output. 9. Thou shall think about the social consequences of the program you are writing or the system you are designing. 10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

51 Ethics (cont.) Information Security failure to obey Code of Ethics implies loss of accreditation or certification Organizations with Code of Ethics and consequently (may) result in dramatically reduced marketability and earning power 1. Association of respected non-profit professional society Computing with scientific & educational orientation Machinery (ACM) ACM s code of ethics addresses a wide range of ethical duties the ones related to information security specify that each ACM member should: protect confidentiality of information cause no harm (e.g. loss) of information protect privacy of others protect IP & copyright of others

52 Ethics (cont.) 2. (ISC) 2 non-profit organization; focuses on development & implementation of info. sec. certifications & credentials 4 mandatory canons of (ISC) 2 code of ethics are: protect society, the commonwealth, and the infrastructure act honorably, honestly, justly, responsibly and legally provide diligent and competent service to principals advance and protect the profession 3. SANS professional research & education cooperative organ. Institute - prepares individuals towards GIAC accreditation (GIAC) GIAC s code of ethics is organized into 3 key areas: I will strive to know myself and be honest about my capability I will conduct my business in a manner that assures the IT profession is considered one of integrity professionalism I respect privacy and confidentiality

Chapter 15 Criminal Law and Procedures

Chapter 15 Criminal Law and Procedures Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures

More information

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes.

H. R. To amend titles 17 and 18, United States Code, to strengthen the protection of intellectual property, and for other purposes. F:\SLS\SLS_.XML 0TH CONGRESS D SESSION H. R. To amend titles and, United States Code, to strengthen the protection of intellectual property, and for other purposes. IN THE HOUSE OF REPRESENTATIVES M. introduced

More information

CYBERCRIME AND THE LAW

CYBERCRIME AND THE LAW CYBERCRIME AND THE LAW INTERNATIONAL LAW CYBERCRIME CONVENTION Convention on Cybercrime / Budapest Convention first international treaty seeking to address Internet and computer crime by harmonizing national

More information

Updated Administration Proposal: Law Enforcement Provisions

Updated Administration Proposal: Law Enforcement Provisions Updated Administration Proposal: Law Enforcement Provisions [Changes to existing law are in shown in italics, bold, and strikethrough format] SEC. 101. Prosecuting Organized Crime Groups That Utilize Cyber

More information

Information Security Law: Control of Digital Assets.

Information Security Law: Control of Digital Assets. Brochure More information from http://www.researchandmarkets.com/reports/2128523/ Information Security Law: Control of Digital Assets. Description: For most organizations, an effective information security

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws

Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Order Code RS20830 Updated February 25, 2008 Cybercrime: A Sketch of 18 U.S.C. 1030 and Related Federal Criminal Laws Summary Charles Doyle Senior Specialist American Law Division The federal computer

More information

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5 PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

Glossary. To seize a person under authority of the law. Police officers can make arrests

Glossary. To seize a person under authority of the law. Police officers can make arrests Criminal Law Glossary Arrest Charge Convicted Court Crime/Offence Crown Attorney or Prosecutor Criminal Custody Guilty Illegal Innocent Lawyer To seize a person under authority of the law. Police officers

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws.

Criminal Law. Month Content Skills August. Define the term jurisprudence. Introduction to law. What is law? Explain several reasons for having laws. Criminal Law Month Content Skills August Introduction to law Define the term jurisprudence. What is law? Explain several reasons for having laws. Discuss the relationship between laws and values. Give

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

TITLE I FORMER VICE PRESIDENT PROTECTION ACT

TITLE I FORMER VICE PRESIDENT PROTECTION ACT 122 STAT. 3560 PUBLIC LAW 110 326 SEPT. 26, 2008 Sept. 26, 2008 [H.R. 5938] Former Vice President Protection Act of 2008. 18 USC 1 note. Public Law 110 326 110th Congress An Act To amend title 18, United

More information

San Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0

San Diego Chapter THE REAL BURDEN OF PROOF AUDITORS UNCOVERING CRIMINAL ACTS OR DBPP V1.0 San Diego Chapter AUDITORS UNCOVERING CRIMINAL ACTS THE REAL BURDEN OF PROOF OR DBPP V1.0 Who is This Guy? George R. Thomas, MBA, CIA, CGAP, CRMA Detective Sergeant San Diego Police Department Current

More information

Law, Investigations, and Ethics. Ed Crowley 09

Law, Investigations, and Ethics. Ed Crowley 09 Law, Investigations, and Ethics Ed Crowley 09 Topics Computer Laws HIPAA GLB SOX DCMA Computer Ethics Computer Crime Investigations Crime determination Incident response and computer forensics Evidence

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

DRINKING AND DRIVING OFFENCE

DRINKING AND DRIVING OFFENCE What to do if you are charged with a DRINKING AND DRIVING OFFENCE This booklet is not about provincial Motor Vehicle Act penalties for drinking and driving. This guide explains what normally happens when

More information

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy 1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines

More information

TABLE OF CONTENTS. Homicide Case Flowchart...3. Overview of Homicide Trial...4. Location of Local Court Houses...5. General Courtroom Diagram...

TABLE OF CONTENTS. Homicide Case Flowchart...3. Overview of Homicide Trial...4. Location of Local Court Houses...5. General Courtroom Diagram... A Guide to the Homicide Criminal Justice Process P a g e 2 TABLE OF CONTENTS Homicide Case Flowchart...3 Overview of Homicide Trial...4 Location of Local Court Houses...5 General Courtroom Diagram...6

More information

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5

Service Monitoring Discrimination. Prohibited Uses and Activities Spamming Intellectual Property Violations 5 WIN reserves the right to prioritize traffic based on real time and non-real time applications during heavy congestion periods, based on generally accepted technical measures. WIN sets speed thresholds

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India

Vijay Pal Dalmia, Advocate Delhi High Court & Supreme Court of India Intellectual Property & Information Technology Laws Division Flat No 903, Indra Prakash Building, 21, Barakhamba Road, New Delhi 110001 (India) Phone: +91 11 42492532 (Direct) Phone: +91 11 42492525 Ext

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

The Legal System in the United States

The Legal System in the United States The Legal System in the United States At the conclusion of this chapter, students will be able to: 1. Understand how the legal system works; 2. Explain why laws are necessary; 3. Discuss how cases proceed

More information

Law & Ethics, Policies & Guidelines, and Security Awareness

Law & Ethics, Policies & Guidelines, and Security Awareness Law & Ethics, Policies & Guidelines, and Security Awareness Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of

More information

Legal and Ethical Issues in Computer Security

Legal and Ethical Issues in Computer Security Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo a i A.Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) Fall 2007 :Objectives for this session

More information

BOBCAT COMPUTING POLICY

BOBCAT COMPUTING POLICY BOBCAT COMPUTING POLICY The overarching policy governing computing and networking at Jones is the Policy on Acceptable Use of Electronic Resources. The policy is reprinted in its entirety below. Faculty,

More information

COMPUTER MISUSE AND CYBERCRIME ACT

COMPUTER MISUSE AND CYBERCRIME ACT COMPUTER MISUSE AND CYBERCRIME ACT Act 22 of 2003 9 August 2003 ARRANGEMENT OF SECTIONS 1. Short title 2. Interpretation PART I PRELIMINARY PART II OFFENCES 3. Unauthorised access to computer data 4. Access

More information

STUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER

STUDENT LEGAL SERVICES THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY A GUIDE TO THE LAW IN ALBERTA REGARDING OF EDMONTON COPYRIGHT AND DISCLAIMER COPYRIGHT AND DISCLAIMER A GUIDE TO THE LAW IN ALBERTA REGARDING THEFT, FRAUD AND POSSESSION OF STOLEN PROPERTY version: 2008 STUDENT LEGAL SERVICES OF EDMONTON GENERAL All information is provided for

More information

JUVENILES AND THE LAW

JUVENILES AND THE LAW JUVENILES AND THE LAW When Are You a Juvenile and When Are You an Adult? The answer to this question is complicated because, under Missouri law, when you are considered an adult and when you are considered

More information

INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY

INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY INFORMATION FOR CRIME VICTIMS AND WITNESSES CHARLES I. WADAMS PROSECUTING ATTORNEY Garden City, Idaho 6015 Glenwood St., Garden City, ID 83714 (208) 472-2900 www.gardencityidaho.org A MESSAGE Garden City

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

PRIVACY AND IDENTITY THEFT 2003:

PRIVACY AND IDENTITY THEFT 2003: PRIVACY AND IDENTITY THEFT 2003: Where Are We Now And Where Are We Going.... Huggins v. CitiBank: A Case Study Stephen P. Groves, Sr., Esquire 205 King Street, Suite 400 Charleston, South Carolina 29401

More information

SOCIAL STUDIES 11 CANADA S LEGAL SYSTEM CH. 11

SOCIAL STUDIES 11 CANADA S LEGAL SYSTEM CH. 11 SOCIAL STUDIES 11 CANADA S LEGAL SYSTEM CH. 11 MRS. KAUSHAL 1 The Rule of Law 1. Basic principle is that no one is above the law and everyone is subject to it. This means that we are governed by a fixed

More information

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W

More information

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain

More information

CHAPTER 124B COMPUTER MISUSE

CHAPTER 124B COMPUTER MISUSE 1 L.R.O. 2005 Computer Misuse CAP. 124B CHAPTER 124B COMPUTER MISUSE ARRANGEMENT OF SECTIONS SECTION PART I PRELIMINARY 1. Short title. 2. Application. 3. Interpretation. PART II PROHIBITED CONDUCT 4.

More information

Clients Legal Needs in HIPAA Security Compliance

Clients Legal Needs in HIPAA Security Compliance Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance

More information

As part of their course on law and/or sociology in this module, participants will be able to:

As part of their course on law and/or sociology in this module, participants will be able to: Correctional Service Service correctionnel Service correctionnel Correctional Service Law Correctional Service : At the Heart of Criminal Justice Description The Correctional Service of : At the Heart

More information

Lesson 4. Preventing and Policing White-Collar Crime

Lesson 4. Preventing and Policing White-Collar Crime Preventing and Policing ASSIGNMENT 11 Read this introduction and then read pages 260 294 in White- Collar Crime: The Essentials. White-collar crime is clearly complex and multifaceted. No single theory

More information

Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART. Section 3.1 What Is a Crime?

Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART. Section 3.1 What Is a Crime? Chapter 3 SECTION OPENER / CLOSER: INSERT BOOK COVER ART Section 3.1 Chapter 3 What Criminal Is a Crime? Law Section 3.1 Section 3.2 Particular Crimes Why It s Important Learning the essence of criminal

More information

Information for Crime Victims and Witnesses

Information for Crime Victims and Witnesses Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)

More information

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A)

COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) COMPUTER MISUSE AND CYBERSECURITY ACT (CHAPTER 50A) (Original Enactment: Act 19 of 1993) REVISED EDITION 2007 (31st July 2007) An Act to make provision for securing computer material against unauthorised

More information

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009 Current Laws: A person commits the crime of identity fraud if

More information

OKLAHOMA LAWS RELATING TO IDENTITY THEFT

OKLAHOMA LAWS RELATING TO IDENTITY THEFT OKLAHOMA LAWS RELATING TO IDENTITY THEFT Prepared for VICARS by Legal Aid Services of Oklahoma Introduction: OKLAHOMA LAWS RELATING TO IDENTITY THEFT Identity theft takes place when someone uses your personal

More information

actus reus + mens rea = CRIME

actus reus + mens rea = CRIME THE CRIMINAL EQUATION: actus reus + mens rea = CRIME Proof of Offences A person charged with a criminal offence is presumed innocent until that person pleads guilty or is proven guilty in court. The Crown

More information

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA

HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA TRAINING MANUAL HEALTH INSURANCE PORTABILITY & ACCOUNTABILITY ACT OF 1996 HIPAA Table of Contents INTRODUCTION 3 What is HIPAA? Privacy Security Transactions and Code Sets What is covered ADMINISTRATIVE

More information

CRIMINAL LAW AND VICTIMS RIGHTS

CRIMINAL LAW AND VICTIMS RIGHTS Chapter Five CRIMINAL LAW AND VICTIMS RIGHTS In a criminal case, a prosecuting attorney (working for the city, state, or federal government) decides if charges should be brought against the perpetrator.

More information

Overview of Federal Criminal Cases

Overview of Federal Criminal Cases Overview of Federal Criminal Cases Fiscal Year 2012 Glenn R. Schmitt Jennifer Dukes Office of Research and Data The United States Sentencing Commission 1 received information on 84,360 federal criminal

More information

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the

More information

FedRAMP Package Access Request Form For Review of FedRAMP Security Package

FedRAMP Package Access Request Form For Review of FedRAMP Security Package FedRAMP Package Access Request Form For Review of FedRAMP Security Package INSTRUCTIONS: 1. Please complete this form, then print and sign. 2. Distribute to your Government Supervisor for review and signature.

More information

UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF TENNESSEE DIVISION. UNITED STATES OF AMERICA ) ) ) v. ) No. ) (Judge ) ) )

UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF TENNESSEE DIVISION. UNITED STATES OF AMERICA ) ) ) v. ) No. ) (Judge ) ) ) UNITED STATES DISTRICT COURT FOR THE MIDDLE DISTRICT OF TENNESSEE DIVISION UNITED STATES OF AMERICA ) ) ) v. ) No. ) (Judge ) ) ) PETITION TO ENTER A PLEA OF GUILTY (Misdemeanor) I,, respectfully represent

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT

LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT LAWS OF BRUNEI CHAPTER 194 COMPUTER MISUSE ACT S 65/00 REVISED EDITION 2007 B.L.R.O. 3/2007 CAP. 194] LAWS OF BRUNEI Computer Misuse [2007 Ed. p. 1 LAWS OF BRUNEI REVISED EDITION 2007 CHAPTER 194 COMPUTER

More information

Valdosta State University. Information Resources Acceptable Use Policy

Valdosta State University. Information Resources Acceptable Use Policy Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE

More information

Retaliatory Hacking: Risky Business or Legitimate Corporate Security?

Retaliatory Hacking: Risky Business or Legitimate Corporate Security? Retaliatory Hacking: Risky Business or Legitimate Corporate Security? 1 Presenter: Sean L. Harrington Cybersecurity Partnership Manager and information security risk assessor in the banking industry; Digital

More information

CRIMINAL LAW & YOUR RIGHTS MARCH 2008

CRIMINAL LAW & YOUR RIGHTS MARCH 2008 CRIMINAL LAW & YOUR RIGHTS MARCH 2008 1 What are your rights? As a human being and as a citizen you automatically have certain rights. These rights are not a gift from anyone, including the state. In fact,

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

DISCIPLINARY PROCEDURE

DISCIPLINARY PROCEDURE DISCIPLINARY PROCEDURE 1. Purpose and Scope 1.1 The Company s procedure is designed to help and encourage all workers to achieve and maintain standards of conduct, attendance and job performance. The Company

More information

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy An Introduction to Identity Theft Your Free Copy DO I NEED IDENTITY THEFT INSURANCE? Necessary Coverage or False Sense of Security? Identity theft has become a national concern, with 10 million victims

More information

Where can I get help after a sexual assault?

Where can I get help after a sexual assault? Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone

More information

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat

More information

CRIMINAL INVESTIGATIONS AND PROSECUTIONS OF TAX FRAUD CASES GUIDELINES

CRIMINAL INVESTIGATIONS AND PROSECUTIONS OF TAX FRAUD CASES GUIDELINES STATE OF NEW YORK DEPARTMENT OF TAXATION AND FINANCE W.A. HARRIMAN CAMPUS ALBANY, NY 12227 CRIMINAL INVESTIGATIONS AND PROSECUTIONS OF TAX FRAUD CASES GUIDELINES Introduction Criminal sanctions play an

More information

INCREASED PENALTIES FOR CYBER SECURITY OFFENSES

INCREASED PENALTIES FOR CYBER SECURITY OFFENSES Report to the Congress: INCREASED PENALTIES FOR CYBER SECURITY OFFENSES (As required by section 225(c) of the Homeland Security Act of 2002, Public Law 107-296) UNITED STATES SENTENCING COMMISSION May

More information

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? THE LAW OFFICES OF SCOTT L. KRAMER CRIMINAL DEFENSE FAQ ANSWERS FROM AN DELAWARE COUNTY ATTORNEY: QUESTION: Am I required to allow law enforcement be allowed to search my house or my car? No. You are never

More information

The Witness and the Justice System in Alberta

The Witness and the Justice System in Alberta The Witness and the Justice System in Alberta Introduction This booklet provides basic information about appearing as a witness in the courts of Alberta. It is designed to explain your role as a witness,

More information

BASIC CRIMINAL LAW. Joe Bodiford. Overview of a criminal case Presented by: Board Certified Criminal Trial Lawyer

BASIC CRIMINAL LAW. Joe Bodiford. Overview of a criminal case Presented by: Board Certified Criminal Trial Lawyer BASIC CRIMINAL LAW Overview of a criminal case Presented by: Joe Bodiford Board Certified Criminal Trial Lawyer www.floridacriminaldefense.com www.blawgger.com THE FLORIDA CRIMINAL PROCESS Source: http://www.fsu.edu/~crimdo/cj-flowchart.html

More information

Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY

Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY Employment Manual REHABILITATION OF OFFENDERS AND SELF DISCLOSURE POLICY CONTENTS INTRODUCTION TO REHABILITATION OF OFFENDERS ACT 1974... 1 EXCEPTIONS TO THE ACT... 1 MODIFICATIONS TO THE ACT... 1 POLICY...

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

WHAT S OLD IS NEW AGAIN. PROSECUTING WORKERS COMPENSATION FRAUD UNDER THE 2011 AMENDMENTS

WHAT S OLD IS NEW AGAIN. PROSECUTING WORKERS COMPENSATION FRAUD UNDER THE 2011 AMENDMENTS WHAT S OLD IS NEW AGAIN. PROSECUTING WORKERS COMPENSATION FRAUD UNDER THE 2011 AMENDMENTS Presented and Prepared by: William M. Blumthal, Jr. Supervisor, Workers' Compensation Fraud Unit Illinois Department

More information

MINNESOTA FALSE CLAIMS ACT

MINNESOTA FALSE CLAIMS ACT . MINNESOTA FALSE CLAIMS ACT Sec. 24. [15C.01] DEFINITIONS. Subdivision 1. Scope. For purposes of this chapter, the terms in this section have the meanings given them. Subd. 2. Claim. "Claim" includes

More information

Glossary of Court-related Terms

Glossary of Court-related Terms Glossary of Court-related Terms Acquittal Adjudication Appeal Arraignment Arrest Bail Bailiff Beyond a reasonable doubt Burden of proof Capital offense Certification Charge Circumstantial evidence Citation

More information

FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE

FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE FEDERAL LAWS RELATING TO FRAUD, WASTE AND ABUSE FEDERAL CIVIL FALSE CLAIMS ACT The federal civil False Claims Act, 31 U.S.C. 3729, et seq., ( FCA ) was originally enacted in 1863 to combat fraud perpetrated

More information

HOUSE DOCKET, NO. 4128 FILED ON: 2/28/2014. HOUSE... No. 4077. The Commonwealth of Massachusetts PRESENTED BY: Paul R. Heroux

HOUSE DOCKET, NO. 4128 FILED ON: 2/28/2014. HOUSE... No. 4077. The Commonwealth of Massachusetts PRESENTED BY: Paul R. Heroux HOUSE DOCKET, NO. 4128 FILED ON: 2/28/2014 HOUSE............... No. 4077 The Commonwealth of Massachusetts PRESENTED BY: Paul R. Heroux To the Honorable Senate and House of Representatives of the Commonwealth

More information

Taxation and the Criminal Law

Taxation and the Criminal Law CHAD J. BROWN Presentation Overview 1. Recent History of CRA s Criminal Investigation Program ( CIP ). 2. Offences and Penalties Overview. 3. Typical Offenders. 4. File Chronology. 5. Search Warrants.

More information

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses

Canada s New Anti-Spam Legislation: Overview and Implications for Businesses dentons.com Focus on Communications Canada s New Anti-Spam Legislation: Overview and Implications for Businesses January, 2011 Contact Margot Patterson Dentons Canada LLP Counsel, Ottawa margot.patterson@dentons.com

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2012-149 SENATE BILL 707 AN ACT TO ENACT THE SCHOOL VIOLENCE PREVENTION ACT OF 2012; LIMIT PRAYERS FOR JUDGMENT CONTINUED; AND END SUNSET FOR

More information

Walking Through a Trial

Walking Through a Trial Lesson Overview Overview: This lesson will teach students how the legal system works and how a case progresses through the state courts. Objectives: Students will be able to Define key terms related to

More information

Chapter One: Our Laws. Lessons: 1-1 Our Laws & Legal System 1-2 Types of Laws

Chapter One: Our Laws. Lessons: 1-1 Our Laws & Legal System 1-2 Types of Laws Chapter One: Our Laws Lessons: 1-1 Our Laws & Legal System 1-2 Types of Laws Lesson 1-2 Goals Explain how constitutional, statutory, case and administrative laws are created Explain how to resolve conflicts

More information

Criminal Justice System Commonly Used Terms & Definitions

Criminal Justice System Commonly Used Terms & Definitions Criminal Justice System Commonly Used Terms & Definitions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Accused: Acquittal: Adjudication: Admissible Evidence: Affidavit: Alford Doctrine: Appeal:

More information

PROFESSIONAL COMPUTING

PROFESSIONAL COMPUTING PROFESSIONAL COMPUTING Lecture 2: Legal Perspectives Dr. Mark Lee m.g.lee@cs.bham.ac.uk School of Computer Science, University of Birmingham Autumn 2014 Disclaimer Dr. Lee is a : Award-winning lecturer

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Your Criminal Justice System

Your Criminal Justice System Your Criminal Justice System Helpful Information for the Victims and Witnesses of Crime Provided by Kansas Attorney General Derek Schmidt Victims Services Division 120 SW 10th Ave, 2nd Floor Topeka, KS

More information

EXECUTIVE SUMMARY Compliance Program and False Claims Recovery

EXECUTIVE SUMMARY Compliance Program and False Claims Recovery EXECUTIVE SUMMARY Compliance Program and False Claims Recovery INTRODUCTION: The Federal Deficit Reduction Act of 2005, also known as the DRA, requires that providers give their employees, medical staff,

More information

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998 INTERNAL REVENUE SERVICE UIL: 9999.92-00 Number: 199911041 Release Date: 3/19/1999 CTMonica January 22, 1999 MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) FROM: Barry J. Finkelstein Assistant

More information

PUBLIC DRUNKENNESS Section 5505 of the Pennsylvania Crimes Code (Title 18)

PUBLIC DRUNKENNESS Section 5505 of the Pennsylvania Crimes Code (Title 18) PUBLIC DRUNKENNESS Section 5505 of the Pennsylvania Crimes Code (Title 18) A person is guilty of a summary offense if he appears in any public place manifestly under the influence of alcohol to the degree

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 6 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

The Lawyer as Gatekeeper The Backdrop

The Lawyer as Gatekeeper The Backdrop Lawyers as Gatekeepers The SEC s New Focus on Inside and Outside Counsel Julie M. Allen Frank Zarb National Conference of the Society of Corporate Secretaries and Governance Professionals June 28, 2014

More information

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014

E Safety Policy. 6 th March 2013. Annually. 26 th February 2014 E Safety Policy This e safety policy was approved by the Governing Body on: The implementation of this e safety policy will be monitored by: Monitoring will take place at regular intervals: Reporting to

More information

The Foundation of Juvenile Practice Part 1: You are Adversary Counsel, NOT a GAL! Private Bar Certification Forensic Exercise November 19, 2014

The Foundation of Juvenile Practice Part 1: You are Adversary Counsel, NOT a GAL! Private Bar Certification Forensic Exercise November 19, 2014 The Foundation of Juvenile Practice Part 1: You are Adversary Counsel, NOT a GAL! Private Bar Certification Forensic Exercise November 19, 2014 Role of Juvenile Defense Counsel: Forensic Exercise: Question

More information

Fair and Accurate Credit Transactions Act: More Protection for Consumers

Fair and Accurate Credit Transactions Act: More Protection for Consumers Fair and Accurate Credit Transactions Act: More Protection for Consumers Businesses must heed FACTA requirements for protecting consumers credit records or face criminal or monetary consequences Stacey

More information

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009 Current Laws: Washington s identity theft law states that no

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012 Monitoring and Logging Policy Document Status Security Classification Version 1.0 Level 1 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Change History

More information

ARTICLE 36: KANE COUNTY DRUG REHABILITATION COURT RULES AND PROCEDURES

ARTICLE 36: KANE COUNTY DRUG REHABILITATION COURT RULES AND PROCEDURES ARTICLE 36: KANE COUNTY DRUG REHABILITATION COURT RULES AND PROCEDURES (a) Mission: The Illinois General Assembly has recognized that there is a critical need for a criminal justice program that will reduce

More information

Cyber Crime and Data Retention

Cyber Crime and Data Retention COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

More information