Cybersecurity Law Test 2

Ace your homework & exams now with Quizwiz!

US v. Nosal

-David Nosal worked for Korn/Ferry (recruiting firm) -Left company and worked for them as a contractor with a noncompetition agreement - Nosal launch a competing business -Downloaded data from Korn/Ferry using his credentials -used former assistant login info -charged with 1030, economic espionage -Narrow view

Civil Actions Under CFAA

-court case must be brought within 2 years of act -damage or loss must have occurred

US v. Roberto Rodriguez

-former Social security administration worker -used system to find women's personal information and stalk them -Broad view

US v. John

-former citigroup employee -gave customer information to half-brother (got information from Citigroup system and her computer) -brother used information to commit fraud -broad -5th circuit

Criticisms of CFAA

-some say it does not prevent more harmful cybersecurity events -to big of a punishment for crimes that do little to no harm to people or property -stops researchers from being able to help cybersecurity issues -limits ability to engage in active defense of their computers and networks (hacking back)

DCMA The defendant either

1. designed or produced primarily for circumvention 2. made available despite only limited commercial significance other than circumvention 3. marketed for use in circumvention of the controlling technological measure

Things that do not apply to the trafficking provisions of Section 1-2

1. nonprofit libraries, archives, and educational institutions 2. law enforcement and intelligence activities 3. reverse engineering for interoperability4. encryption research 5. preventing minors from accessing the Internet 6. protection of personally-identifying information 7. security testing

DCMA A plaintiff alleging a violation of a2 must prove

1. ownership of valid copyright on a work 2. effectively controlled by a technological measure which has been circumvented 3. that third parties can now access 4. third parties access without authorization 5. access without authorization in a manner that infringes or facilitates infringing a right protected by the copyright act

Knowing Violations of the Economic Espionage Act

1831-1832 apply to acts that are done knowingly: 1. awareness of the nature of one's conduct 2. an awareness of or a firm belief in or knowledge to a substantial certainty of the existence of a relevant circumstance such as whether the info has economic value

Sections 5a CFAA

5a-knowing transmission that intentionally damages a computer without authorization

Trademark

A brand that has exclusive legal protection for both its brand name and its design (10 years)

Protected Computer

A computer used exclusively by a financial institution or government entity or used in interstate or foreign commerce. (does not have to be in the US)

grey hat hackers

A cross between black and white—they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.

Patent

An exclusive right issued by the U.S. Patent Office that enables the recipient to manufacture, sell, or otherwise control an invention for a period of 20 years from the date of the grant.

What act spells out federal punishments related to hacking which includes imprisonment of uupt to 20 years

Computer Fraud and Abuse Act

Injunctions

Court orders that prohibit a certain activity in order to prevent actual or threatened misappropriation

DCMA

Digital Millennium Copyright Act

New vs. Old hacker ethics

Hacker ethics have started to contradict new rules with hacking so a new type of ethics needed to by determined

First time violations of Sections 5a/5b CFAA

In order to convict someone for 5a/5b and the defendant has not been convicted under the CFAA before one of these must be shown: 1. financial loss during a single year (at least $5000) 2. modification or impairment or future modification/impairment of medical examination, diagnosis, treatment, or care 3. physical injury to someone 4. public health or safety threat 5. damage to a federal gov computer 6. damage of at least 10 protected computer during a year

CFAA Narrow view

Individuals are only liable for CFAA violations if their initial access to the system or data was not permitted. How the individual used the data is irrelevant

Budapest Convention

International convention that requires countries to adopt measures that address 1.illegal access 2. data interference 3. misuse of devices 4. computer related cruad 5. computer related fprgery etc... also required to develop procedures to expedite the preservation of stored data, search and seizing sata,empower authorities to collect data in real time etc...

Statute of Limitations

Plaintiffs must bring economic espionage act civil actions within 3 years of the date the misappropriation was discovered or should have been discovered through exercise of reasonable diligence

DCMA 1st ammendment

Some people think section 1201 goes against freedom of speech- code is speech, it makes research harder-case by case decision

Library of Congress

The librarian can grant exceptions to a1 temporarily for 3 years-things are used for something

Old hackers

Wikileaks

CFAA Broad View

authorized access may include- if someone is given access to a computer to do something lawful and they do something unlawful that is a crime

black hat hackers

break into other people's computer systems and may just look around or may steal and destroy information

Section 1201 Penalties

civil and criminal

DCMA Broad View

creates a new anti-circumvention right distinct from the traditional exclusive rights of a copyright owner

Purpose and intent required under 1832

defendant must have intended to commit crime

White hack hacker

ethical hackers, can sometime be paid employees or contractors working for companies as security specialists, try to find security holes by hacking

Social engineering

hackers use their social skills to trick people into revealing access credentials or other valuable information

What is ethical hacking

hacking performed by a company or individual in an attempt to identify potential threats on a computer or network. Try to find security weak points before they are found by malicious hackers

First time violators of 5c CFAA

if someone has not been convicted of CFAA before the gov can only charge a misdemeanor by fine and a year in prison

Section 5c CFAA

intentional access without authorization that causes damages and loss

Section 5b of CFAA

intentionally access without authorization that recklessly causes damage

Limitation of Budapest Convention

nations that are common sources of hacks against US are not part of convention

Is not knowing the law an excuse for commiting a crime

no

CFAA

primary U.S. federal statute and prohibits and penalizes certain forms of computer hacking, imposes criminal and civil penalties for those who hack without authorization or exceeds authorized access to the computer

Section 1831 Economic Espionage

prohibits economic espionage to benefit a foreign government or entity

DCMA a1

prohibits the act of circumventing technology that controls access to copyrighted material

Economic Espionage Act 1996

prohibits the theft of US companies' trade secrets either to benefit a foreign government or to economically benefit anyone other than the owner

Section 1832 Economic Espionage

prohibits theft of trade secrets to benefit one company at the expense of another company

DCMA a2

prohibits trafficking in technology that facilitates circumventing of access control measures

DCMA b1

prohibits trafficking in technology that facilitates circumvention of measures that protect against copyright infringement

Vulnerability Disclosure Program

provide guidelines and safe harbors for outside parties to report vulnerabilities-may receive limited authorization or compensation without getting in trouble

Civil Seizures are what?

remedies that wronged can seek

Civil Seizures

seizure of property that is necessary in order to prevent spreading or use of trade secret that has been misappropriated

Pen testing

set of practices carried out usually by an outside company hired by a corporation to attempt to access their systems

Misappropriation

the act of taking what belongs to someone else and using it illegally for one's own gain

Copyright

the exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same. (life of author +70 years)

DCMA Narrow View

there must be a link between the access that is being circumvented and the infringement of copyrighted content, 2. does not create a broad new property right, instead it protects circumvention that is reasonably related to a property right that is currently provided by the copyright act

Economic Espionage applies to what type of intellectual property

trade secrets

Pen testing requires

well-documented, written agreements, certification to be a pen tester (white hat hacker), without these it turns into grey hat or black hat hacking

Trade secrets

all forms or ideas/information that owner has kept a secret and the information has economic value or potential (lasts forever)

Defend Trade Secrets Act

allows companies to bring a civil suit if they have been victim to misappropriation

Damages- Defend Trade Secrets Act

allows plaintiffs to recover damages for actual loss caused by misappropriation as well as damages for unjust enrichment that are not included in the actual loss total


Related study sets

Principles of Economics: Macroeconomics Quiz 4

View Set

Ec28 Quiz 3 - Chapter 19 (Tax Incidence)

View Set

Intermediate Macroeconomic Theory Unit 1

View Set

Surah Baqarah Ayahs 1-100 Arabic/English Translation (Saheeh International)

View Set