Cybersecurity Laws

pptx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

220

Subject

Law

Date

Jan 9, 2024

Type

pptx

Pages

11

Uploaded by michaeljr1119

Report
Cybersecurity Laws BY: MICHAEL HARRIS CYB-220-0500 PROFESSOR PRESTON RICH JUNE 4, 2022
Objective Purpose of Cyber laws Enacting laws ( All Writs Act of 1789) Different types of intellectual property and its protection laws Enforcing cybersecurity laws/ who enforces the laws Infringement of Cyber law and its affects Universal City Studios, Inc. v. Corley, 273 F. 3d 429 (2d Cir. 2001)
Purpose of Cyber Laws The main purpose of Cybersecurity laws is to reduce the risk from things such as, Fraud, credit card theft, identity theft and more. With technology growing everyday the government must stay on top of the crimes that are being committed and reduce the risk. It will be very hard to completely stop Cyber crimes from being committed.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
All Writs Act of 1789 It is still used in most of the cases involving technology such as the case with apple and the FBI The law gives the federal judges the power to issue court orders The law covers so much that it is needed in times like apple vs FBI The law allows the judges to court order companies to show information that normally is not allowed.
What is Intellectual property? Intellectual property is any product of the human intellect that the law protects from unauthorized use by others (Legal Information Institute, 2022).
Different Types of Intellectual property 4 main types of intellectual property - Copyright - Patent - Trademark - Trade Secret If a person makes a song the copyright protection law covers “original works of authorship”.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Enforcing Cybersecurity Laws The Federal trade commission (FTC) and the U.S. Securities and Exchange Commission (SEC) enforce the cybersecurity laws From the FTC to local law enforcement laws are put in place for cybersecurity.
Affects of Cybersecurity law infringement Cybersecurity law infringement affects those being infringed upon and those committing infringement. Those being infringed upon could loose everything, if it’s a business they could lose customers or tarnish their reputation. Those committing the crimes can be prosecuted
Universal City Studios, Inc. v. Corley, 273 F. 3d 429 (2d Cir. 2001) Universal sued Corley for facilitating encryption-circumventing technology. Corley defended the posting of DeCSS on First Amendment grounds, arguing that computer code was protected speech (Quimbee, 2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References Upcounsel. (2020). Cyber Law: Everything You Need to Know. https://www.upcounsel.com/cyber-law#:~:text=The%20purpose%20of%20cyber%20law,Cy bersecurity%20Research%20and%20Development . Legal Information Institute. (2022). Intellectual property. https://www.law.cornell.edu/wex/intellectual_property#:~:text=In%20general%20terms%2C %20intellectual%20property,monopoly%20in%20the%20protected%20property . Cardozo Law. (2021). 4 Types of Intellectual Property Protection. https://online.yu.edu/cardozo/blog/4-types-of-intellectual-property-protection Quinbee. (2022). Universal City Studios, Inc. v. Corley. https://www.quimbee.com/cases/universal-city-studios-inc-v-corley#:~:text=Universal%20s ued%20Corley%20for%20facilitating,computer%20code%20was%20protected%20speech .
Loom Link https://www.loom.com/share/20d8556c613b4b99b4d0adc356d50042 https://www.loom.com/share/c8366070f0e24ba881f223067b867743