100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary C841___Task_1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS :C841: Legal Issues in Information Security $7.49   Add to cart

Summary

Summary C841___Task_1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS :C841: Legal Issues in Information Security

1 review
 302 views  5 purchases

C841___Task_1 Running head: TECHFITE CASE STUDY LEGAL ANALYSIS :C841: Legal Issues in Information Security

Preview 2 out of 9  pages

  • August 3, 2021
  • 9
  • 2021/2022
  • Summary
All documents for this subject (6)

1  review

review-writer-avatar

By: robysharlene • 1 year ago

avatar-seller
Nipsey
Running head: TECHFITE CASE STUDY LEGAL ANALYSIS 1
TechFite Case Study Legal Analysis
Cameron F. Finley
Student #000761328
Western Governor’s University
C841: Legal Issues in Information SecurityThis study source was downloaded by 100000829696844 from CourseHero.com on 08-03-2021 03:44:53 GMT -05:00
https://www.coursehero.com/file/59312340/C841-Task-1docx/This study resource was
shared via CourseHero.com TechFite Case Study Legal Analysis
Upon suspicion of unethical and illegal activity, board of directors’ chairperson for TechFite John Jackson commissioned independent investigators to conduct a security audit of the
IT and business practices of the Applications Division. At the conclusion of the investigation, several pieces of evidence pointing to wrongdoing on the part of some of the key personnel in the Applications Division were found. Specifically, damages of intellectual property rights against two potential clients of TechFite were found to have taken place as a result of malfeasance on the part of the Applications Division. This is a legal analysis of those findings and guidance for TechFite to use for corrective and perhaps legal action moving forward.
A – Application of Law
The principle laws relevant to this section of the analysis are Federal Statutes the Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA). A1 – CFAA & ECPA
The Computer Fraud and Abuse Act was passed and signed into law in 1986. The CFAA criminalizes certain types of damage against a “protected computer”. Under the statute, a protected computer qualifies as a computer used by the federal government, a computer used by a financial institution, and a computer used in interstate or foreign commerce. (Bailie, n.d.)
Under the definition of a computer used in interstate or foreign commerce, the CFAA expands the definition of a protected computer to include the Internet because it is used to facilitate commerce between different states. The CFAA also prohibits the unauthorized trafficking of computer access information that allows people to access other computers without authorization as well as users that exceed the scope of their authorization level without granted permissions or maliciously so.
The Electronic Communications Privacy Act protects the privacy of communications transfers via electronic means such as wire and radio but does not protect oral communications, paged communications, and more. It also protects communications held in electronic storage from unauthorized access. Like provisions in the CFAA, this extends to unauthorized privilege escalation with the intent to view, steal, or otherwise coopt documents and resources intended for
another party. (“What is the Electronic Communications Privacy Act?,” n.d.) In the course of the TechFite investigation, it was discovered that the company conducts business via Internet and wire transfer with three possible “shell” companies and banks in This study source was downloaded by 100000829696844 from CourseHero.com on 08-03-2021 03:44:53 GMT -05:00
https://www.coursehero.com/file/59312340/C841-Task-1docx/This study resource was
shared via CourseHero.com

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nipsey. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.49  5x  sold
  • (1)
  Add to cart