TechFite Case Study
Section A: Application of the Law
The Computer Fraud and Abuse Act (CFAA) of 1986 (most recently amended in 2008) makes it a criminal offence to access a protected computer either without authorization or in excess of ones authorized access (US Department of Justice, 2022). For a claim of access without authorization to be valid, the individual must be aware of the facts that make such access unauthorized and must have accessed the computer without the authorization of an entity or person authorized to give such access (US Department of Justice, 2022). For individuals with authorized access, the CFAA imposes limits on such access, making it illegal to knowingly access areas in a protected computer, including databases, user accounts, folders and files, to which ones access does not extend (US Department of Justice, 2022). Under the CFAA, the investigating team will check the divisions networks and computer systems, and evaluate the mechanisms that are in place to prevent employees from gaining unauthorized or excess access into protected computers. The division may be criminally liable if the investigation finds evidence of breaches that may have allowed employees to gain unauthorized access into the protected computers of other companies.
The Electronic Communications Privacy Act (ECPA) prohibits individuals from accessing without proper authorization, electronic communications in the form of data, telephone conversations, or email, while such communication is in transit, stored in a computer, or being made (Bureau of Justice Assistance, n.d.). The BI unit may be criminally liable under the ECPA if there is evidence to indicate that the division maintained surveillance over emails of other companies with the aim to gather intelligence.
Besides the risk of criminal liability as provided in statute, it may also be prudent to assess the companys risk of legal action based on the tort of negligence. Investigators could make use of several laws and court cases in justifying legal action based on negligence from the information provided in the case study. In the case of Raleigh vs Performance Plumbing and Heating 130 P.3d 1011,1015 (Colo. 2006), the court held that for a negligence claim to succeed, the defendant must prove four elements of negligence by a preponderance of the evidence and the extent of their damages. The court identified the four elements as: duty, causation, breach, and damages (Scordato, 2022). The defendant must owe a legal duty of care to the plaintiff (duty), which they failed to fulfil (breach), causing (causation) harm or injury to the plaintiff (damages).
The California Supreme Court, in Brown vs USA Taekwondo (2021) set a standard that courts could use to determine whether...
In determining whether a breach of duty occurred, Judge Learned Hand, in United States vs. Caroll Towing 160 F.2d 482 (2d Cir. N.Y. Mar. 17, 1947) established the Hand formula, which determines whether a breach exists using the relationship B < PL, where B is the burden of acting reasonably, P is the probability of loss, and L is the extent of loss suffered by the plaintiff (Legal Information Institute, n.d.). A breach exists when B is less than the product of the probability of injury and the extent of loss (Legal Information Institute, n.d.).
Besides...
The company could address most of its non-compliance issues by strengthening its internal controls and increasing oversight over internal activities taking place on the network. There is a need for increased monitoring of activities on user accounts and regular audits into client databases to minimize the risk of fraud. The companys senior management could play a more active role in compliance by demanding regular accurate reports from IT security staff and engaging external auditors to regularly carry out inspections and assessments to identify potential areas of non-compliance before they escalate. There is also a need to invest in a Chinese wall methodology and ensure strict adherence to the principle of least privilege as a means to safeguard sensitive client information by ensuring that such information is segregated from each other. Finally, the compan could strengthen its oversight procedures by establishing policies that bar…
References
Bureau of Justice Assistance (n.d.). Electronic Communications Privacy Act of 1986 (ECPA). Author. https://bja.ojp.gov/program/it/privacy-civil-liberties/authorities/statutes/1285
Legal Information Institute (n.d.). Negligence. Author. https://www.law.cornell.edu/wex/negligence
Legal Information Institute (n.d.). Sarbanes-Oxyley Act. Author. https://www.law.cornell.edu/wex/sarbanes-oxley_act
Scordato, M. R.(2022). Three kinds of fault: Understanding the purpose and function of causation in tort law. University of Miami Law Review, 77(149), 149-212.
US Department of Justice (2022, May). 9-48- Computer Fraud and Abuse Act. Author. https://www.justice.gov/jm/jm-9-48000-computer-fraud
For this reason, it is critical to ascertain the causes of word reading difficulties in order to identify these problems and provide appropriate instruction as early as possible. (Allor, 2002, p. 47) Spear-Swerling & Sternberg note that the fundamental reason that children need to be screened for difficulties in pre-reading skills is that once the child is supposed to, by grade level be able to perform certain tasks it may
Opportunities . Indian elevator market growth is very promising in the 1995 timeframe, which is when this case study takes place. The low-end of the Indian elevator market is experiencing 27% increases in unit shipments, and 17% unit increases overall. . The market itself is highly fragmented for elevators in India. 70% of the demand for elevators is at the low-end of the market; 20% at the middle-end, and 10% at the top-end. . High levels of recurring
Treatment Plan: The treatment plan should include medication for high blood pressure and diabetes. Indeed, according to some evidence, the long term usage of diuretic antihypertensives to reduce the presence of excess salts in the body can help to lower blood pressure. (Klatt, 1) Given that the subject of this discussion also suffers from an elevated risk of myocardial infarction, the danger of cardiac arrest or general heart failure is of greater concern than the presence of
Josie Case Study The author of this report is asked to look at a case study relating to a young girl named Josie. The author is asked to answer to four particular high level questions and provide clear and concrete advice and solution to each of the four. Those four questions, in order, asked for risk factors, what should be done, what roadblocks will occur and the key legal/ethical considerations that
curriculum committee proceed with the work yet to be done? The curriculum committee should solicit information from all stakeholders, including part-time faculty, current students, and also the five acute care hospitals which are a part of the university network. It should create a map for future curriculum development, complete with specific deadlines for a timeline of activities. Unless goals are specifically set with a deadline-driven focus, it is far too
Innovation and Creativity: Case Study of Facebook "FACEMASH TO FACEBOOK: AN INNOVATIVE JOURNEY FROM UNIVERSITY SOCIAL NETWORKING WEBSITE TO BILLION DOLLAR Business" On 28th October, 2003, Mark Zukerberg wrote Facemash in order to create a social networking website for the students of Harvard. At that time he was not aware that he was starting a whole new era of social networking innovation and creativity. What was started as a tool of social
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now