C841 (IHP4) Task 1: Quachell Peele Student Id
C841 (IHP4) Task 1: Quachell Peele Student Id
C841 (IHP4) Task 1: Quachell Peele Student Id
QUACHELL PEELE
STUDENT ID
CFAA
ECPA
AND 1. The investigation the case study revealed that the was an
unusual request for a dummy accounts not created through
ECPA
the proper channels. in addition to these accounts regularly
accessed data that would be deemed confidential in nature
from legal HR and the finance department.
2.
A2.
ECPA: it is an offense to intentionally access without
authorization a location that a electronic communication
are used. The BI unit, Sarah Miller and team in particular
violated this when they used the Metasploit tool to
illegally scan and penetrate electronic devices they THREE
LAWS
regularly could not access.
1. The first thing that I noticed Is that there is a lack of policies protecting internal
business information and that of potential clients from any kind of unauthorized
activity. This leads to data leaks and security breaches. In creating this policy
alone we can build a Chinese wall up that will keep information, this is evident
when two potential clients report that after sign-in NDA’s and answering
questionnaires their competitors seemed to obtain proprietary information
2. Another policy that should be implemented is that the principle of least
privilege. There is no checks and balances. There are dummy accounts
accessing legal, financial and hr accounts regularly. If this policy was in place
then maybe those accounts would be roaming freely. Also orange leaf and union
city may not have had their information in the arms of their competitors
A4. SOX
Under SOX section 704 Techvite is in violation for falsifying the sales.
The three false account all seem to point to the friend of Carl Jasper.
These business don’t appear to actually exist
D. REFERENCES/SOURCES
Sources
Computer Fraud and Abuse Act (CFAA) , Ucertify, 2018, wgu.ucertify.com/?
func=ebook&text=ecpa&chapter_no=13#03bDj .
Jarrett, H. Marshall. Prosecuting Computer Crimes, Office of Legal Education Executive Office for
United States Attorneys, 2008, www.justice.gov/sites/default/files/criminalccips/legacy/2015/01/14/
ccmanual.pdf.
United States Department of Justice. (2018, Mar 1). Unlawful Access to Stored Communications.
Retrieved from Offices of the United States Attorneys: https://www.justice.gov/usam/criminalresource-
manual-1061-unlawful-access-stored-communications-18-usc-2701 F
Federal Cybersecurity and Data Privacy Laws Directory. (n.d.). Retrieved April 20 2022, from
https://www.itgovernanceusa.com/federal-cybersecurity-and-privacy-laws Sarbanes-Oxley Act of 2002,
Pub. L. No. 107-204, § 101. (2002). Retrieved from