Verified Document

TechFite Case Study Technology Case Study

TechFite Case Study

Section A: Application of the Law

The Computer Fraud and Abuse Act (CFAA) of 1986 (most recently amended in 2008) makes it a criminal offence to access a protected computer either without authorization or in excess of ones authorized access (US Department of Justice, 2022). For a claim of access without authorization to be valid, the individual must be aware of the facts that make such access unauthorized and must have accessed the computer without the authorization of an entity or person authorized to give such access (US Department of Justice, 2022). For individuals with authorized access, the CFAA imposes limits on such access, making it illegal to knowingly access areas in a protected computer, including databases, user accounts, folders and files, to which ones access does not extend (US Department of Justice, 2022). Under the CFAA, the investigating team will check the divisions networks and computer systems, and evaluate the mechanisms that are in place to prevent employees from gaining unauthorized or excess access into protected computers. The division may be criminally liable if the investigation finds evidence of breaches that may have allowed employees to gain unauthorized access into the protected computers of other companies.

The Electronic Communications Privacy Act (ECPA) prohibits individuals from accessing without proper authorization, electronic communications in the form of data, telephone conversations, or email, while such communication is in transit, stored in a computer, or being made (Bureau of Justice Assistance, n.d.). The BI unit may be criminally liable under the ECPA if there is evidence to indicate that the division maintained surveillance over emails of other companies with the aim to gather intelligence.

Besides the risk of criminal liability as provided in statute, it may also be prudent to assess the companys risk of legal action based on the tort of negligence. Investigators could make use of several laws and court cases in justifying legal action based on negligence from the information provided in the case study. In the case of Raleigh vs Performance Plumbing and Heating 130 P.3d 1011,1015 (Colo. 2006), the court held that for a negligence claim to succeed, the defendant must prove four elements of negligence by a preponderance of the evidence and the extent of their damages. The court identified the four elements as: duty, causation, breach, and damages (Scordato, 2022). The defendant must owe a legal duty of care to the plaintiff (duty), which they failed to fulfil (breach), causing (causation) harm or injury to the plaintiff (damages).

The California Supreme Court, in Brown vs USA Taekwondo (2021) set a standard that courts could use to determine whether...

Parts of this document are hidden

View Full Document
svg-one

In the courts view, the plaintiff must prove that the parties share a special relationship that gives rise to a reasonable duty of care and that the defendants failure to act reasonably resulted in a foreseeable injury (Scordato, 2022). The foreseeability requirement is satisfied if the plaintiff can demonstrate that the possibility of danger resulting from the defendants actions was apparent and reasonably foreseeable (Scordato, 2022).

In determining whether a breach of duty occurred, Judge Learned Hand, in United States vs. Caroll Towing 160 F.2d 482 (2d Cir. N.Y. Mar. 17, 1947) established the Hand formula, which determines whether a breach exists using the relationship B < PL, where B is the burden of acting reasonably, P is the probability of loss, and L is the extent of loss suffered by the plaintiff (Legal Information Institute, n.d.). A breach exists when B is less than the product of the probability of injury and the extent of loss (Legal Information Institute, n.d.).

Besides...

Parts of this document are hidden

View Full Document
svg-one

…access by infringing on the databases of other divisions. As a consequence of this non-compliance, employees are able to access sensitive and proprietary information outside their division. There is also evidence of non-compliance with The Electronic Communications Privacy Act (ECPA), which prohibits individuals from accessing without proper authorization, electronic communications in the form of data, telephone conversations, or email. The investigation reveals that the companys employees use tools that violate the ECPA by monitoring clients emails and other forms of electronic communication with the aim of gathering intelligence. There is also evidence of non-compliance with the Sarbnes-Oxyley Act, which prohibits public officers from misrepresenting financial information. The investigation points to cases of employees using fictitious clients to inflate sales revenues to mislead customers, shareholders, and internal stakeholders. At the same time, the company is at risk of legal action based on the tort of negligence, resulting from employees failure to exercise reasonable duty of care owed to the company.

The company could address most of its non-compliance issues by strengthening its internal controls and increasing oversight over internal activities taking place on the network. There is a need for increased monitoring of activities on user accounts and regular audits into client databases to minimize the risk of fraud. The companys senior management could play a more active role in compliance by demanding regular accurate reports from IT security staff and engaging external auditors to regularly carry out inspections and assessments to identify potential areas of non-compliance before they escalate. There is also a need to invest in a Chinese wall methodology and ensure strict adherence to the principle of least privilege as a means to safeguard sensitive client information by ensuring that such information is segregated from each other. Finally, the compan could strengthen its oversight procedures by establishing policies that bar…

Sources used in this document:

References

Bureau of Justice Assistance (n.d.). Electronic Communications Privacy Act of 1986 (ECPA). Author. https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285

Legal Information Institute (n.d.). Negligence. Author. https://www.law.cornell.edu/wex/negligence

Legal Information Institute (n.d.). Sarbanes-Oxyley Act. Author. https://www.law.cornell.edu/wex/sarbanes-oxley_act

Scordato, M. R.(2022). Three kinds of fault: Understanding the purpose and function of causation in tort law. University of Miami Law Review, 77(149), 149-212.

US Department of Justice (2022, May). 9-48- Computer Fraud and Abuse Act. Author. https://www.justice.gov/jm/jm-9-48000-computer-fraud

Cite this Document:
Copy Bibliography Citation

Related Documents

Case Study 8-Year-Old With Dyslexia
Words: 3291 Length: 7 Document Type: Case Study

For this reason, it is critical to ascertain the causes of word reading difficulties in order to identify these problems and provide appropriate instruction as early as possible. (Allor, 2002, p. 47) Spear-Swerling & Sternberg note that the fundamental reason that children need to be screened for difficulties in pre-reading skills is that once the child is supposed to, by grade level be able to perform certain tasks it may

Case Study From Harvard Business
Words: 902 Length: 3 Document Type: Case Study

Opportunities . Indian elevator market growth is very promising in the 1995 timeframe, which is when this case study takes place. The low-end of the Indian elevator market is experiencing 27% increases in unit shipments, and 17% unit increases overall. . The market itself is highly fragmented for elevators in India. 70% of the demand for elevators is at the low-end of the market; 20% at the middle-end, and 10% at the top-end. . High levels of recurring

Case Study: Risk Assessment for
Words: 1660 Length: 5 Document Type: Research Proposal

Treatment Plan: The treatment plan should include medication for high blood pressure and diabetes. Indeed, according to some evidence, the long term usage of diuretic antihypertensives to reduce the presence of excess salts in the body can help to lower blood pressure. (Klatt, 1) Given that the subject of this discussion also suffers from an elevated risk of myocardial infarction, the danger of cardiac arrest or general heart failure is of greater concern than the presence of

Case Study Josie
Words: 1207 Length: 3 Document Type: Case Study

Josie Case Study The author of this report is asked to look at a case study relating to a young girl named Josie. The author is asked to answer to four particular high level questions and provide clear and concrete advice and solution to each of the four. Those four questions, in order, asked for risk factors, what should be done, what roadblocks will occur and the key legal/ethical considerations that

Case Study: Philmore College
Words: 1342 Length: 5 Document Type: Case Study

curriculum committee proceed with the work yet to be done? The curriculum committee should solicit information from all stakeholders, including part-time faculty, current students, and also the five acute care hospitals which are a part of the university network. It should create a map for future curriculum development, complete with specific deadlines for a timeline of activities. Unless goals are specifically set with a deadline-driven focus, it is far too

Case Study of Facebook
Words: 1672 Length: 6 Document Type: Case Study

Innovation and Creativity: Case Study of Facebook "FACEMASH TO FACEBOOK: AN INNOVATIVE JOURNEY FROM UNIVERSITY SOCIAL NETWORKING WEBSITE TO BILLION DOLLAR Business" On 28th October, 2003, Mark Zukerberg wrote Facemash in order to create a social networking website for the students of Harvard. At that time he was not aware that he was starting a whole new era of social networking innovation and creativity. What was started as a tool of social

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now