{"id":5546,"date":"2023-12-12T00:19:43","date_gmt":"2023-12-12T06:19:43","guid":{"rendered":"https:\/\/www.incredigeek.com\/home\/?p=5546"},"modified":"2024-02-06T20:59:25","modified_gmt":"2024-02-07T02:59:25","slug":"table-of-types-of-law-for-cyber-security","status":"publish","type":"post","link":"https:\/\/www.incredigeek.com\/home\/table-of-types-of-law-for-cyber-security\/","title":{"rendered":"Table of Types of Law for Cyber Security"},"content":{"rendered":"\n<p>There are three types of law.  Criminal, civil, and administrative.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Type of Law<\/strong><\/td><td><strong>Examples<\/strong><\/td><td><strong>Standard of Proof<\/strong><\/td><td><strong>Burden of Proof<\/strong><\/td><td><strong>Penalty<\/strong><\/td><\/tr><tr><td>Criminal Law<\/td><td>Murder, assault, robbery, arson<\/td><td>Beyond a reasonable doubt<\/td><td>Innocent until proven guilty<\/td><td>Fines, Jail, Prison, Death penalty<\/td><\/tr><tr><td>Civil Law<\/td><td>Property Disputes, Personal injury<\/td><td>Preponderance of evidence<\/td><td>Claimant must give proof (most cases)<\/td><td>Compensation for injuries\/damage<\/td><\/tr><tr><td>Administrative Law<\/td><td>Define standards of performance and conduct for major industries, organizations and government agencies<\/td><td><\/td><td><\/td><td><\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Table of Law<\/figcaption><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.diffen.com\/difference\/Civil_Law_vs_Criminal_Law\">https:\/\/www.diffen.com\/difference\/Civil_Law_vs_Criminal_Law<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">List of Laws and Acts<\/h2>\n\n\n\n<p>The following is a list of &#8220;good to know&#8221; legislative acts.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Acronym<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Notes<\/strong><\/td><\/tr><tr><td>CFAA<\/td><td>Computer Fraud and Abuse Act<\/td><td>First major cyber crime legislation<\/td><\/tr><tr><td><\/td><td>Federal Sentencing Guidelines (1991)<\/td><td>Responsibility on senior management<\/td><\/tr><tr><td>ECPA<\/td><td>Electronic Communications Privacy Act of 1986<\/td><td>Made it a crime to invade the electronic privacy of an individual<\/td><\/tr><tr><td>CALEA<\/td><td>Comm Assistance for Law Enforcement Act of 1994<\/td><td>Amended ECPA.  Made wiretaps possible for law enforcement with a court order.<\/td><\/tr><tr><td><\/td><td>Economic Espionage Act of 1996<\/td><td>Made theft no longer tied to something physical<\/td><\/tr><tr><td>FISMA<\/td><td>Federal Information Security Management Act<\/td><td>Cyber security requirements for government agencies<\/td><\/tr><tr><td>DMCA<\/td><td>Digital Millennium Copyright Act<\/td><td>Copyright protection is 70 years +<br>1st major revision added CD\/DVD protections<\/td><\/tr><tr><td>USA PATRIOT<\/td><td>USA PATRIOT Act of 2001<\/td><td>Gave law enforcement and intelligence agencies broader wiretapping authorizations<\/td><\/tr><tr><td><\/td><td>Identity Theft and Assumption Deterrence Act (1998)<\/td><td>Made identity theft a crime.  Up to 15 years in prison and $250,000 fine.<\/td><\/tr><tr><td>HIPPA<\/td><td>Health Insurance Portability and Accountability Act (1996)<\/td><td>Regulations for security measures for hospitals, physicians, and insurance companies<\/td><\/tr><tr><td>HITEC<\/td><td>Health Information Technology for Economic and Clinical Health Act of 2009<\/td><td>Amended HIPPA.  Updated privacy\/security requirements for Business Associates (BAs), requires a written contract known as a business associate agreement (BAA).  BAs are directly subject to HIPPA and enforcement actions like a covered entity.<br>HITECH also introduced new data breach notifications.<\/td><\/tr><tr><td>GLBA<\/td><td>Gramm-Leach-Bliley Act<\/td><td>Limits services that banks, lenders, and insurance agencies can provide and information they can share with each other<\/td><\/tr><tr><td>COPPA<\/td><td>Child Online Privacy Protection Act<\/td><td>Seeks to protects children (&lt;13 years old) online<\/td><\/tr><tr><td>FERPA<\/td><td>Family Educational Rights and Privacy Act<\/td><td>Gives students certain privacy rights.  Deals with adults >18, and Children in school &lt;18<\/td><\/tr><tr><td>ITAR<\/td><td>International Traffic in Arms Regulation<\/td><td>Regulates the export of military and defense related technologies<\/td><\/tr><tr><td>EAR<\/td><td>Export Administration Regulations<\/td><td>For commercial use, but may have military applications.<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Table of Laws and Acts<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Trademark, Patents, Copyright etc.<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Name<\/strong><\/td><td><\/td><td><strong>Protection Length<\/strong><\/td><\/tr><tr><td>Trademarks<\/td><td><\/td><td>10 Years<\/td><\/tr><tr><td>Patents<\/td><td><\/td><td>20 Years<\/td><\/tr><tr><td>Copyright <\/td><td><\/td><td>70 Years after the death of the author<\/td><\/tr><tr><td>Trade Secrets<\/td><td><\/td><td>Until they are leaked.<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Table of Trademarks, Patents, Copyright, and Trade Secrets<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are three types of law. Criminal, civil, and administrative. Type of Law Examples Standard of Proof Burden of Proof Penalty Criminal Law Murder, assault, robbery, arson Beyond a reasonable doubt Innocent until proven guilty Fines, Jail, Prison, Death penalty &hellip; <a href=\"https:\/\/www.incredigeek.com\/home\/table-of-types-of-law-for-cyber-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1644,573],"tags":[1610,358,1612,1642,1640,1617,1618,1620,1613,1614,1604,1611,1609,1615,1616,1621,1619,1371,503,1641,1643],"class_list":["post-5546","post","type-post","status-publish","format-standard","hentry","category-learning","category-security","tag-calea","tag-cert","tag-cfaa","tag-cism","tag-cissp","tag-civil-law","tag-criminal-law","tag-cyber","tag-dmca","tag-ecpa","tag-ferpa","tag-fisma","tag-glba","tag-hippa","tag-hitech","tag-law","tag-laws","tag-learning","tag-security","tag-security-2","tag-study"],"_links":{"self":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/5546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/comments?post=5546"}],"version-history":[{"count":4,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/5546\/revisions"}],"predecessor-version":[{"id":5613,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/posts\/5546\/revisions\/5613"}],"wp:attachment":[{"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/media?parent=5546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/categories?post=5546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.incredigeek.com\/home\/wp-json\/wp\/v2\/tags?post=5546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}