Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

630-2 yhomit | Computer Science homework help

[ad_1]

PART ONE

1. What is the Electronic Communications Privacy Act (ECPA) of 1986?  Please use outside resources to assist with your answer. 

2. Research the United States v. Councilman case. Why was this case important to the history of the Electronic Communications Privacy Act? 

3. Research a recent case of identity theft. Please explain the case in detail. Also, be sure to provide the outcome. Do you agree with the ruling?

4. Find recent laws dealing with identity theft in your state of residence. If you could improve the law in one way what would you change or do differently? 

  • 500 words
  • APA format
  • 3 sources minimum

PART TWO

Research at least two current cyber related laws. Discuss the pros and cons of each law. Based upon the cons what recommendations would you provide to make the law better?

  • 500 words
  • APA format
  • 3 sources minimum

SOURCES:

  1. Part VII – Management Role in Security, Chapter 64 – U.S. Legal and Regulatory Issues – Computer Security Handbook
  2. Part VIII – Public Policy and other Considerations, Chapter 71 – Healthcare Security and Privacy – Computer Security Handbook
  3. Article – Future Tense: Catch me if you can. New York: ACM. doi:10.1145/1897852.1897879 Retrieved August 15, 2017 from http://apus.summon.serialssolutions.com.ezproxy1.apus.edu/#!/search?bookMark=ePnHCXMwXV3LCsIwECziwQf-gKeo56p5kdRrUfyAei55LXqoCtaDf–mqYKechmWkJCdnZDMTrKZiW-zr233h8tnyU6HCrmhGiWLZOtuVMUgOplKlSuksGFXpKKwRcIafRMpFhvjbHHozDVIhbIu7EiJGepMmkAuQF63J8EJTLPTYV-Vx7xvH5AbygXPLZOaSnBAA7KWAi8tDd65rYw8KVnwhrEA3giwYJTTABoKp4WlxnIWW-kuU9xPkq77_X3UGkMLimcBQas_kLHxksK1v6h5QhnX1PfkI1H368Df1EJUgg
  4. Article – Captain crunch, phone home.  (2001). Communications Today, 7(23), 1. Retrieved August 21, 2017 from https://search-proquest-com.ezproxy1.apus.edu/docview/219239778?accountid=8289 
  5. Article – A Short History of Computer Viruses and Attacks (2003, February 14).  Washington Post. Retrieved August 15, 2017, from http://www.washingtonpost.com/wp-dyn/articles/A50636-2002Jun26.html 

[ad_2]

Source link