I INF 306 Study Guide - Final Guide: Trusted Computer System Evaluation Criteria, Digital Evidence, Wireless Lan

64 views4 pages

Document Summary

Eula-creates a contract binding the licensor and licensee. Comprehensive crime control act, 1984- knowingly accesses a computer without authorization(mostly fed comps) Computer security act of 1987-defines nist as standard setting body(mosty federal comps) International efforts- protections are often more stringent than in the us. The federal trade commission act- ftc act was more commercial regulation not so much focused on financial firms. The electronic communications privacy act - the ecpa, as amended, protects wire, oral, and electronic communications while those communications are being made, are in transit, and when they are stored on computers. The act applies to email, telephone conversations, and data stored electronically. Can-spam act/telephone consumer protection act- attempts at non-harassment. Patents/trademarks/copyright(ip protections)- creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Disallowing illicit behavior (copy protection)- activation codes, drm, watermarking. Copyright exceptions(fair use)- 1) commentary and criticism 2) parody 3)derivative work.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers

Related Documents