Statutory and regulatory GRC
The Electronic Communications Privacy Act
was passed in 1986—Public Law 99-508, Statute 1848 and extends the government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer.
Which of the following acts is a collection of statutes that regulate the interception of wire electronic and oral communications quizlet?
Terms in this set (10)
Which of the follwing is a collection of statues that regulates the interception of wire, eletronci, and oral communications?
The Sarbanes-Oxley (SOX) Act of 2002
was passed as a result of the Enron and WorldCom financial scandals.
Which of the following acts is also widely known as the Gramm-Leach-Bliley Act?
Understanding the Financial Services Modernization Act of 1999
. This legislation is also known as the Gramm-Leach-Bliley Act, the law was enacted in 1999 and removed some of the last restrictions of the Glass-Steagall Act of 1933.
What is the subject of the Computer Security Act quizlet?
What is the subject of the Computer Security Act?
Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident
. You just studied 14 terms!
Privacy
is the right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality. Laws, policies, and their associated penalties only provide deterrence if, among other things, potential offenders fear the probability of a penalty being applied.
Which act is a collection of statutes that regulates the interception of wire electronic?
90-351; 6/19/68), also known as
the “Wiretap Act”
: prohibits the unauthorized, nonconsensual interception of “wire, oral, or electronic communications” by government agencies as well as private parties, establishes procedures for obtaining warrants to authorize wiretapping by government officials, and.
What is the purpose of the Electronic Communications Privacy Act of 1986?
Electronic Communications Privacy Act of 1986 – Title I: Interception of Communications and Related Matters –
Amends the Federal criminal code to extend the prohibition against the unauthorized interception of communications to
include specific types of electronic communications.
Which of the following functions does information security perform for an organization quizlet?
Which of the following functions does information security perform for an organization?
Protecting the organization’s ability to function, Enabling the safe operation of applications implemented on the organization’s IT systems
, and Protecting the data the organization collects and uses.
Are the fixed moral attitudes or customs of a particular group?
Ethics
are based on cultural mores: relatively fixed moral attitudes or customs of a societal group.
Is an act against an asset that could result in a loss?
– threat: a potential risk of an asset’s loss of value. … a potential weakness in an asset or its defensive control(s).
attack
. an act against an asset that could result in a loss.
What is the subject of the Computer Security Act group of answer choices?
What is the subject of the Computer Security Act?
Laws, policies, and their associated penalties
only provide deterrence if offenders fear the penalty, expect to be caught, and expect the penalty to be applied if they are caught.
When information is whole complete and uncorrupted?
Question Answer | Information has…when it is whole, complete, and uncorrupted. Integrity | The senior technology officer is typically the chief … officer. Executive |
---|
Is the quality or state of being genuine or original rather than a reproduction or fabrication?
Authenticity
–The quality or state of being genuine or original, rather than a reproduction or fabrication.
- Keep Current on all Security Patches. …
- Detect and Respond to Intrusions Quickly. …
- Implement Principle of Least Privilege (Minimize Data Access) …
- Use Multi-Factor Authentication. …
- Implement IP Whitelisting. …
- Encrypt Network Traffic Inside the System.
Confidentiality
.
Confidentiality
seeks to prevent the unauthorized disclosure of information: it keeps data secret. In other words, confidentiality seeks to prevent unauthorized read access to data.
The Privacy Act of 1974, as amended, 5 U.S.C. § 552a, establishes a code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies.