CYB 320 Module Two Activity Worksheet (2) (1)
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
320
Subject
Law
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by GrandFlowerDove6
CYB 320 Module Two Activity Worksheet
Privacy and Communication Laws
This worksheet has two parts that you must complete. For
Part I
, complete the table by filling in the two blank columns for each law. For
Part II
,
select either the
United States v. Simons
case study or the
Steve Jackson Games, Inc. v. United States Secret Service
case study from the Module
Two Reading and Resources section, then respond to the questions in the table.
Part I: Laws
Law
Briefly describe the law (3–4 sentences)
Describe the law’s effect on digital
investigations (3–4 sentences)
First Amendment
In accordance with the first amendment, the
Congress cannot pass any laws that are directly
related to religion. Gives us the right to
demonstrate in a peaceful manner and the
freedom to express ourselves and our thoughts
in the press. Gives us the right to demonstrate
in a peaceful manner.
The use of the internet is not exempt from the
protections afforded to us by the First
Amendment's guarantee of our right to
freedom of expression. This includes private
online forms, online chats, electronic mail, and
other similar kinds of communication. A
warrant would need to be issued by the judge
before any of these items could be used in the
proceeding that they are related to.
Fourth Amendment
The 4th Amendment made it illegal to carry
out unauthorized searches and seizures, and it
also outlined the requirements that must be
met in order to get a search warrant for a
person's home or other private property.
However, since that time, it has been changed
in order to generate certain expectations, such
as the searching of cars, the hunting for
evidence that is plainly visible, and the
searching of borders.
The protections afforded by the Fourth
Amendment have been expanded so that they
now apply to any circumstance in which a
person may have a justifiable expectation that
certain information will be kept secret from
other people. If this occurs, a search warrant is
necessary, unless the individual in issue gives
their free and informed agreement to the
investigation, or unless the investigation is
authorized under the laws that are in effect.
Electronic Communications Privacy Act
The scope of the government's authority to
monitor electronic communications and to
gather electronic data from computers was
narrowed as a result of this law. Among the
In accordance with the requirements of the
Act, the law enforcement agency must first get
a warrant before it may compel the providers
to hand over the information. relating to any
1
Law
Briefly describe the law (3–4 sentences)
Describe the law’s effect on digital
investigations (3–4 sentences)
many examples is wiretapping. In addition,
there must to be set norms for the
implementation of search warrants when it
comes to digital communications.
and all wire, oral, or electronic messages that
are being stored or transferred somewhere
else. Since that time, the overwhelming
majority of the data has been uploaded to a
cloud storage service.
Privacy Act of 1974
a group of guidelines that govern the
gathering, storage, use, and dissemination of
information about individuals that is
maintained in the record-keeping systems of
federal agencies. The federal government is
responsible for the creation of this code of fair
information practices.
Should infractions be committed, the offender
risks being charged with disorderly behavior
and receiving a fine of up to $5,000. In every
single one of the lawsuits that involved the
Privacy Act, the prosecution was unable to
demonstrate beyond a reasonable doubt that
the person being defended willingly disclosed
any of the information that was at issue,
despite their best efforts.
USA Patriot Act
The primary objectives of the USA Patriot Act
are to deter and punish terrorist offenses
committed in the United States and elsewhere
throughout the world, to enhance the
investigative tools that are available to law
enforcement, and for a wide range of
additional reasons identifier, and prosecute
cases of money laundering and the support of
terrorism on a global scale;
When the federal government investigates a
subject that they have reason to believe may
be connected to terrorism, they have a great
degree of leeway to do so as a result of this act
since it grants them a great deal of discretion.
During the course of investigations into acts of
terrorism, it may be conceivable to perform
covert searches of electronic property. This
would include acts of cyber terrorism in
addition to other types of criminal activity
committed online.
Regulation (EU, Euratom) No 883/2013 of the
European Parliament
investigations that were conducted by the
European Anti-Fraud Office (OLAF), as well as
the elimination of the Regulation (EC) No
1073/1999 of the European Parliament and of
the Council and the Regulation (Euratom) No
1074/1999 of the Council.
This law establishes an office that is
accountable for organizing the investigation
and offering help to those who are conducting
the investigation. In addition to this, it is
required by IT that member states grant
authority to the office to carry out checks and
assessments on the investigations being
2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help