CYB 320 Module Two Activity Worksheet (2) (1)

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

320

Subject

Law

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by GrandFlowerDove6

Report
CYB 320 Module Two Activity Worksheet Privacy and Communication Laws This worksheet has two parts that you must complete. For Part I , complete the table by filling in the two blank columns for each law. For Part II , select either the United States v. Simons case study or the Steve Jackson Games, Inc. v. United States Secret Service case study from the Module Two Reading and Resources section, then respond to the questions in the table. Part I: Laws Law Briefly describe the law (3–4 sentences) Describe the law’s effect on digital investigations (3–4 sentences) First Amendment In accordance with the first amendment, the Congress cannot pass any laws that are directly related to religion. Gives us the right to demonstrate in a peaceful manner and the freedom to express ourselves and our thoughts in the press. Gives us the right to demonstrate in a peaceful manner. The use of the internet is not exempt from the protections afforded to us by the First Amendment's guarantee of our right to freedom of expression. This includes private online forms, online chats, electronic mail, and other similar kinds of communication. A warrant would need to be issued by the judge before any of these items could be used in the proceeding that they are related to. Fourth Amendment The 4th Amendment made it illegal to carry out unauthorized searches and seizures, and it also outlined the requirements that must be met in order to get a search warrant for a person's home or other private property. However, since that time, it has been changed in order to generate certain expectations, such as the searching of cars, the hunting for evidence that is plainly visible, and the searching of borders. The protections afforded by the Fourth Amendment have been expanded so that they now apply to any circumstance in which a person may have a justifiable expectation that certain information will be kept secret from other people. If this occurs, a search warrant is necessary, unless the individual in issue gives their free and informed agreement to the investigation, or unless the investigation is authorized under the laws that are in effect. Electronic Communications Privacy Act The scope of the government's authority to monitor electronic communications and to gather electronic data from computers was narrowed as a result of this law. Among the In accordance with the requirements of the Act, the law enforcement agency must first get a warrant before it may compel the providers to hand over the information. relating to any 1
Law Briefly describe the law (3–4 sentences) Describe the law’s effect on digital investigations (3–4 sentences) many examples is wiretapping. In addition, there must to be set norms for the implementation of search warrants when it comes to digital communications. and all wire, oral, or electronic messages that are being stored or transferred somewhere else. Since that time, the overwhelming majority of the data has been uploaded to a cloud storage service. Privacy Act of 1974 a group of guidelines that govern the gathering, storage, use, and dissemination of information about individuals that is maintained in the record-keeping systems of federal agencies. The federal government is responsible for the creation of this code of fair information practices. Should infractions be committed, the offender risks being charged with disorderly behavior and receiving a fine of up to $5,000. In every single one of the lawsuits that involved the Privacy Act, the prosecution was unable to demonstrate beyond a reasonable doubt that the person being defended willingly disclosed any of the information that was at issue, despite their best efforts. USA Patriot Act The primary objectives of the USA Patriot Act are to deter and punish terrorist offenses committed in the United States and elsewhere throughout the world, to enhance the investigative tools that are available to law enforcement, and for a wide range of additional reasons identifier, and prosecute cases of money laundering and the support of terrorism on a global scale; When the federal government investigates a subject that they have reason to believe may be connected to terrorism, they have a great degree of leeway to do so as a result of this act since it grants them a great deal of discretion. During the course of investigations into acts of terrorism, it may be conceivable to perform covert searches of electronic property. This would include acts of cyber terrorism in addition to other types of criminal activity committed online. Regulation (EU, Euratom) No 883/2013 of the European Parliament investigations that were conducted by the European Anti-Fraud Office (OLAF), as well as the elimination of the Regulation (EC) No 1073/1999 of the European Parliament and of the Council and the Regulation (Euratom) No 1074/1999 of the Council. This law establishes an office that is accountable for organizing the investigation and offering help to those who are conducting the investigation. In addition to this, it is required by IT that member states grant authority to the office to carry out checks and assessments on the investigations being 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help