COMPUTER CRIME LAW PROFESSOR KERR

Size: px
Start display at page:

Download "COMPUTER CRIME LAW PROFESSOR KERR"

Transcription

1 COMPUTER CRIME LAW PROFESSOR KERR SYLLABUS Spring 2017 I. Course Summary This course examines the legal issues raised by computer-related crime. The course coverage divides into three topics: (1) substantive criminal law, which considers the scope and structure of the criminal laws relating to computer crime; (2) criminal procedure, which examines the nature and function of the privacy laws that regulate law enforcement investigations of computer-related crime; and (3) jurisdictional issues, which evaluate how competing jurisdictions (state vs. state, federal vs. state, and U.S. vs. foreign) might work together or independently to investigate and prosecute computer-related crimes. II. Materials The course assignments are from Orin Kerr, Computer Crime Law (3d. ed. 2013) as well as the 2017 Statutory and Case Supplement to that casebook. Both books are required. The publication date for the 2017 Statutory and Case Supplement is December 31, 2016, so copies will be available by the first week of class. III. Class Policies, Office Hours, Exam During the first week, I will cold call students. Please be prepared. At the end of the first week, each student will sign up for a panel day Tuesday, Wednesday, or Thursday and will be on call on the weekly class meeting that occurs on that day. I reserve the right to adjust grades up or down for class participation. What matters is quality, not quantity. My default office hours this semester will be Wednesday 1:30 to 2:30 pm, in my office (Stuart 311) or by appointment, which you should please feel free to make. I have an open door policy for students in my classes, so feel free to stop by. The best way to get in touch with me is by okerr@law.gwu.edu. The exam will be a 3-hour open-book exam. It will likely be a mixture of multiple choice and essay. Everything we cover, in the reading and/or in class, is fair game for the exam.

2 IV. Class Assignments Here are the class assignments for the course. Assignments are from the main casebook unless noted as readings from the 2017 Supplement (designated Supplement ). Citations to statutes in parentheses immediately below the page assignments are citations to statutes you should read along with the assignment. The current statutes are found in the 2017 Supplement. Class Number Topic Assignment 1 Introduction to Computer Misuse The Property-Based Approach to Computer Misuse, and an Introduction to 18 U.S.C. 1030, the Computer Fraud and Abuse Act (18 U.S.C. 1030) 3 The Meaning of Unauthorized Access: What is Access, and What is Authorization? 31-51, Supplement (18 U.S.C. 1030) 4 More on the Meaning of Authorization : Contract and Norms-Based Approaches to Authorization 5 Access to Obtain Information and the Crime of Computer Fraud, 18 U.S.C. 1030(a)(2) and (a)(4) 6 The Computer Damage Statute, 18 U.S.C. 1030(a)(5) 7 More on 1030(a)(5), and Property Crimes to Protect Economic Interests Online 51-65, Supplement 127 to 132. (18 U.S.C. 1030) Supplement (18 USC 1030(a)(2) &(a)(4)) Supplement (18 U.S.C. 1030(a)(5)) , Supplement (18 U.S.C. 1343, 2314)

3 8 The Economic Espionage Act and Identity Theft ; Supplement (18 U.S.C. 1832, 1839, and 1028A) 9 Criminal Copyright Law 10 More on Criminal Copyright, and an Introduction to Online Threats and Harassment 11 Online Threats, Harassment, and Revenge Porn Laws (18 U.S.C. 2319, 17 U.S.C. 506 reprinted together in the supplement) 192 to the top of 204. Supplement 143 to 152. (18 U.S.C. 875, 2261A, and skim 47 U.S.C. 223) (starting at n.1) to 231. Supplement, middle of Internet Gambling Bottom of 232 to 247 (18 U.S.C. 1084) 13 Internet Obscenity (18 U.S.C. 1462, 1465) 14 Child Pornography Offenses Supplement (18 U.S.C. 2252, 2252A)

4 15 Virtual Child Pornography and First Amendment Limits (18 U.S.C. 2252A, 2256) 16 Traveler Cases and Online Entrapment (18 U.S.C. 2422, 2423) 17 Sentencing Computer Crimes under the U.S. Sentencing Guidelines, and their Application to Child Pornography Offenses Intro on p.328, Sentencing Computer Misuse Offenses, and an Introduction to the Fourth Amendment 19 Fourth Amendment Searches and Seizures of Computers 20 Exigent Circumstances and Scope of Consent for Computer Search and Seizure 21 Third Party Consent Searches of Computers and Searches Incident to Arrest 22 Computer Border Searches and Government Workplace Searches 23 Warrant Searches: Probable Cause and Particularity for Digital Evidence 24 Executing Computer Warrants and The Scope of Plain View for Computer Searches 25 Ex Ante Restrictions on Warrants, the Fifth Amendment, and the All Writs Act Supplement middle of 365 (through n.6) Supplement Supplement from bottom of 177 through Supplement 183 to top of (end of n.3); Supplement Supplement ; Supplement Bottom of 495- top of 513; Supplement 217 to top of middle of 524, Supplement 222 to top of 233.

5 26 Fourth Amendment in a Network Environment, Part I: Non-Content Information 27 Fourth Amendment in a Network Environment, Part II: Contents ; Supplement from note 1 on page 240 to middle of , Supplement middle of 243 to Introduction to the Wiretap Act , 29 The Consent Exception and the Provider Exception Supplement 253 to middle of 255. (18 U.S.C. 2510, 2511, 2515) Supplement (18 U.S.C. 2511(2)) 30 The Cybersecurity Act of 2015 and the Pen Register Statute 31 The Stored Communications Act, Part I 32 The Stored Communications Act, Part II 33 Federalism and Computer Crime Law: The Scope of Federal Authority 34 Federalism and Computer Crime Law, Part II: The Scope of State Authority 35 Computer Crimes Beyond the United States Border 36 The Microsoft Case and Mutual Legal Assistance Treaties Supplement 258 to top of 261. Bottom (skim both 6 U.S.C and 18 U.S.C ) (18 U.S.C. 2701, 2703, 2708, 2711) Supplement (18 U.S.C. 2702) , bottom of 690 (starting at n2) to 696. Supplement 265 to middle of middle of 718, 720 to middle of 723. Supplement middle of 274 to top of 277. Middle of 724-middle of 748 Supplement bottom 277 to top of 770

6 37 National Security Investigations END OF COURSE

Privacy and Anonymity Steven M Bellovin

Privacy and Anonymity Steven M Bellovin Privacy and Anonymity Steven M Bellovin smb+6184@cs... Steven M. Bellovin January 18, 2011 1 Course Outline Legal framework (US and European) Data mining and databases Anonymous commerce (digital cash)

More information

ITU Model Cybercrime Law: Project Overview

ITU Model Cybercrime Law: Project Overview ITU Model Cybercrime Law: Project Overview Jody R. Westby ICT Applications and Cybersecurity Division Policies and Strategies Department, BDT International Telecommunication Union International

More information

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012

CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE. Octopus Conference, Strasbourg 06 June, 2012 CYBERCRIME LEGISLATION DEVELOPMENT IN NIGERIA AN UPDATE Octopus Conference, Strasbourg 06 June, 2012 T.GEORGE-MARIA TYENDEZWA Head, Computer Crime Prosecution Unit, Federal Ministry of Justice, Abuja,

More information

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013

ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013 HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa ITU/HIPPSA Technical Assistance on Cybercrime Law for the Republic of Rwanda, Kigali 11 th -12 th July 2013 Draft Computer

More information

Syllabus for P.G. Diploma in Cyber Law and Information Technology

Syllabus for P.G. Diploma in Cyber Law and Information Technology Syllabus for P.G. Diploma in Cyber Law and Information Technology Paper I: Basic of computer and Cyber Security Paper II: Information Technology Law (Cyber Law) Paper III: Cyber crime and investigation

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

Typical Investigative Steps and Traveler cases

Typical Investigative Steps and Traveler cases Typical Investigative Steps and Traveler cases Thomas K. Clancy copyright, Thomas K. Clancy, all rights reserved, 2012. "inside the box, outside the box" Outside the box The Box Sender (AOL) obtaining

More information

Communication and Usage of Internet and Policy

Communication and Usage of Internet and  Policy Communication and Usage of Internet and Email Policy Policy Category Administration Policy Code ADM HE 27 Policy owner Chief Executive Officer Responsible Officer Chief Executive Officer Approving authority

More information

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV

MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV MEETINGS OF MINISTERS OF JUSTICE OR OEA/Ser.K/XXXIV OTHER MINISTERS OR ATTORNEYS GENERAL CIBER-VIII/doc.1/11 OF THE AMERICAS 6 November 2013 Original: English Eighth Meeting of the Working Group on Cyber-crime

More information

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK

ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK ATLANTIC BROADBAND LAW ENFORCEMENT HANDBOOK INTRODUCTION Atlantic Broadband will assist law enforcement agencies in their investigations while protecting subscriber privacy as required by law and applicable

More information

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL

LEGAL SOLUTION CYBERCRIME LEGAL SOLUTION LEGAL SOLUTION NATIONAL, REGIONAL, INTERNATIONAL CYBERCRIME LEGAL SOLUTION NATIONAL, REGIONAL AND INTERNATIONAL SOULTIONS IN THE FIGHT AGAINST CYBERCRIME WITH A FOCUS ON THE BUDAPEST CONVENTION ON CYBERCRIME Regional Workshop on Frameworks for Cybersecurity

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Auditing and assurance

Auditing and assurance Auditing and assurance Higher School of Economics, ICEF Lecturer: Anna Pirozhkova Seminars: Tatiana Shurchkova Contacts +7 (916) 468 33 99 (Anna), ann.pirozhkova@gmail.com Target audience 4th Year students.

More information

CS 241 Data Organization using C

CS 241 Data Organization using C CS 241 Data Organization using C Fall 2018 Instructor Name: Dr. Marie Vasek Contact: Private message me on the course Piazza page. Office: Farris 2120 Office Hours: Tuesday 2-4pm and Thursday 9:30-11am

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM.

CYBER CRIME A COMPARATIVE LAW ANALYSIS SANDRA MARIANA MAAT. submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM. CYBER CRIME A COMPARATIVE LAW ANALYSIS by SANDRA MARIANA MAAT submitted in part fulfilment of the requirements for the degree of MAGISTER LEGUM at the UNIVERSITY OF SOUTH AFRICA SUPERVISOR: PROF D P VAN

More information

ISM 324: Information Systems Security Spring 2014

ISM 324: Information Systems Security Spring 2014 ISM 324: Information Systems Security Spring 2014 Instructor: Co-Instructor: Office: E-Mail: Phone: Office Hours: Jeffrey Wall Hamid Nemati 392 Bryan Building jdwall2@uncg.edu (email is the preferred method

More information

Oklahoma State University Spears School of Business Department of Management Information Systems

Oklahoma State University Spears School of Business Department of Management Information Systems Oklahoma State University Spears School of Business Department of Management Information Systems Information Assurance Management TCOM 5223 Wednesday 4:30 PM 7:10 PM (Central Time) Location: Tulsa North

More information

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania

ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania C-PROC Cybercrime Programme Office Council of Europe, Bucharest, Romania ISACA National Cyber Security Conference 8 December 2017, National Bank of Romania The role of legislation in enhancing the cyber

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

Typical Investigative Steps and Legal Framework

Typical Investigative Steps and Legal Framework Typical Investigative Steps and Legal Framework National Center For Justice And The Rule Of Law University of Mississippi School of Law Thomas K. Clancy Director www.ncjrl.org investigating on the internet

More information

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS

ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS 1 ECONOMICS 5317: CONTEMPORARY GOVERNMENT AND BUSINESS RELATIONS Fall 2011, MWF 9:05-9:55, HCB 408 INSTRUCTOR: David VanHoose OFFICE HOURS: OFFICE: 339 Hankamer MWF 8:00-9:00 & 12:15-1:15; OFFICE PHONE:

More information

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018

Lahore University of Management Sciences. ACCT 250 Auditing Spring Semester 2018 Lahore University of Management Sciences ACCT 250 Auditing Spring Semester 2018 Instructor Syed Zain ul Abideen / Waqar Ali Room No. SDSB room no. 442, 422 Office Hours TBA Email syed.zain@lums.edu.pk;

More information

Data Preservation Checklists

Data Preservation Checklists Data Preservation Checklists At the G8 meeting of Justice and Interior Ministers in Moscow in October 1999, the Ministers recognized that law enforcement authorities conducting criminal investigations

More information

DHS Hackers and the Lawyers Who Advise Them

DHS Hackers and the Lawyers Who Advise Them SESSION ID: LAW-T08 DHS Hackers and the Lawyers Who Advise Them MODERATOR: Gabriel Taran Assistant General Counsel, Cybersecurity DHS Office of General Counsel (OGC) PANELISTS: From the Cybersecurity and

More information

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03665) VERSION: 2_011718

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03665) VERSION: 2_011718 THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and SPRING 2015 Unique#: (03665) VERSION: 2_011718 Instructor : Juan Reyes, Lecturer Class times : Tuesday and Thursday, 3:30-5:00pm Class location

More information

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019

Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019 Oklahoma State University Institute of Technology Online Common Syllabus Spring 2019 ITD3153 LAN/WAN Routing & Switching An advanced course on the design, configuration, and maintenance of switches, routers,

More information

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications Gramm-Leach Bliley Act Section 501(b) and Customer Notification Roger Pittman Director of Operations Risk Federal Reserve Bank of Atlanta Overview Bank IT examination perspective Background information

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

UNODC tackling cybercrime in support of a safe and secure AP-IS

UNODC tackling cybercrime in support of a safe and secure AP-IS UNODC tackling cybercrime in support of a safe and secure AP-IS Mr. Alexandru CACIULOIU Cybercrime Project Coordinator South East Asia and the Pacific Second session of the Asia-Pacific Information Superhighway

More information

Data Breach Preparation and Response. April 21, 2017

Data Breach Preparation and Response. April 21, 2017 Data Breach Preparation and Response April 21, 2017 King & Spalding Data, Privacy & Security King & Spalding s 60 plus lawyer Data, Privacy & Security ( DPS ) Practice is best known for: Experienced crisis

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

CRIJ 1301 Introduction to Criminal Justice (8-Week On-line Version) Fall 2017 Aug. 28 through Oct. 22

CRIJ 1301 Introduction to Criminal Justice (8-Week On-line Version) Fall 2017 Aug. 28 through Oct. 22 CRIJ 1301 Introduction to Criminal Justice (8-Week On-line Version) Fall 2017 Aug. 28 through Oct. 22 Professor: Dr. Won-Jae Lee Office: HAR 209 Telephone: (325) 486-6717 Email: wlee@angelo.edu Office

More information

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Midstate Telephone & Midstate Communications. Acceptable Use Policy Midstate Telephone & Midstate Communications Acceptable Use Policy Introduction Midstate is at all times committed to complying with the laws and regulations governing use of the Internet, e-mail transmission

More information

The Non-Code Layers of the Cyberstack & the Globalization of Criminal Evidence. Peter Swire IISP: Friday Cyber Lecture October 13, 2017

The Non-Code Layers of the Cyberstack & the Globalization of Criminal Evidence. Peter Swire IISP: Friday Cyber Lecture October 13, 2017 The Non-Code Layers of the Cyberstack & the Globalization of Criminal Evidence Peter Swire IISP: Friday Cyber Lecture October 13, 2017 Overview Swire background Non-code layers of the cyber stack Lessons

More information

Policy recommendations. Technology fraud and online exploitation

Policy recommendations. Technology fraud and online exploitation Policy recommendations Technology fraud and online The opportunity Cloud computing is revolutionizing how people work, learn, interact, and play. Education is just one example as a new generation of cloud-based

More information

Breach Notification Form

Breach Notification Form Breach Notification Form Report a breach of personal data to the Data Protection Commission Use this form if you are a Data Controller that wishes to contact us to report a personal data breach that has

More information

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face

Course Title: Computer Networking 2. Course Section: CNS (Winter 2018) FORMAT: Face to Face Course Title: Computer Networking 2 Course Section: CNS-106-50 (Winter 2018) FORMAT: Face to Face TIME FRAME: Start Date: 15 January 2018 End Date: 28 February 2018 Monday & Wednesday 1:00pm 5:00pm CREDITS:

More information

Guiding principles on the Global Alliance against child sexual abuse online

Guiding principles on the Global Alliance against child sexual abuse online Annex to the Declaration on Launching the Global Alliance against child sexual abuse online, further setting forth the intent of the participants Guiding principles on the Global Alliance against child

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form MONTENEGRO Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Syllabus: Cybersecurity Law Seminar. George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber

Syllabus: Cybersecurity Law Seminar. George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber Brief Course Description: Syllabus: Cybersecurity Law Seminar George Mason University Antonin Scalia Law School Spring 2018 Professors Kiran S. Raj & Scott Ferber This seminar course will provide students

More information

Business Information System Analysis and Design Fall 2017

Business Information System Analysis and Design Fall 2017 Business Information System Analysis and Design Fall 2017 Instructor: Dr. Monica Johar Phone: 704-687-7658 Email: msjohar@uncc.edu Office location: Friday 352C Office hours: Tuesday, Thursday 12:30 1:15pm

More information

BCS Higher Education Qualifications. Diploma in IT. Professional Issues in Information Systems Practice Syllabus

BCS Higher Education Qualifications. Diploma in IT. Professional Issues in Information Systems Practice Syllabus BCS Higher Education Qualifications Diploma in IT Professional Issues in Information Systems Practice Syllabus Version 3.0 December 2016 This is a United Kingdom government regulated qualification which

More information

COMPUTER FORENSICS (CFRS)

COMPUTER FORENSICS (CFRS) Computer Forensics (CFRS) 1 COMPUTER FORENSICS (CFRS) 500 Level Courses CFRS 500: Introduction to Forensic Technology and Analysis. 3 credits. Presents an overview of technologies of interest to forensics

More information

INFS 2150 (Section A) Fall 2018

INFS 2150 (Section A) Fall 2018 INFS 2150 (Section A) Fall 2018 Introduction to Web Development Class meets TUE & THU: 12:30am-1:45pm: in Wheatley 114 Instructor: Peter Y. Wu Office: Wheatley 309 Office Hours: Tuesday 9:00 am-12:00 noon;

More information

Digital Forensics ITP 375 (3 Units)

Digital Forensics ITP 375 (3 Units) Digital Forensics ITP 375 (3 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming more of

More information

EXAM PREPARATION GUIDE

EXAM PREPARATION GUIDE When Recognition Matters EXAM PREPARATION GUIDE PECB Certified ISO 31000 Risk Manager www.pecb.com The objective of the PECB Certified ISO 31000 Risk Manager examination is to ensure that the candidate

More information

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence

Incident Handling. Road Map. Week 4: Incidents, Evidence and the Law. Types of Evidence. Digital Evidence. Characteristics of Evidence Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly State University of New York at Albany Road Map What is digital evidence? What are different types of evidence?

More information

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology

PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology PRC Cyber Security Law --- How does it affect a UK business? Xun Yang Of Counsel, Commercial IP and Technology 24 October 2017 Content Overview of Cyber Security Law Observations on Implementation of Cyber

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017

Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 Oklahoma State University Institute of Technology Face-to-Face Common Syllabus Fall 2017 ITD 1253 Object-Oriented Programming Using C# Students learn how to design, code, and test applications in C# using

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

USF Sarasota-Manatee - New Undergraduate Course Proposal Form

USF Sarasota-Manatee - New Undergraduate Course Proposal Form USF Sarasota-Manatee - New Undergraduate Course Proposal Form 1. College/School Contact Information Tracking Number Date & Time Submitted 2 2010-03-29 16:54:18 Discipline College/School Budget Account

More information

EnviroIssues Privacy Policy Effective Date:

EnviroIssues Privacy Policy Effective Date: EnviroIssues Privacy Policy Effective Date: 9-28-18 EnviroIssues, Inc. ( we, us, our ) is committed to protecting the privacy of visitors to its website and users of its services (each a Service and collectively

More information

ESET 349 Microcontroller Architecture, Fall 2018

ESET 349 Microcontroller Architecture, Fall 2018 ESET 349 Microcontroller Architecture, Fall 2018 Syllabus Contact Information: Professor: Dr. Byul Hur Office: 008 Fermier Telephone: (979) 845-5195 FAX: E-mail: byulmail@tamu.edu Web: rftestgroup.tamu.edu

More information

CS 4317: Human-Computer Interaction

CS 4317: Human-Computer Interaction September 8, 2017 Tentative Syllabus CS 4317: Human-Computer Interaction Spring 2017 Tuesday & Thursday, 9:00-10:20, Psychology Building, room 308 Instructor: Nigel Ward Office: CCS 3.0408 Phone: 747-6827

More information

List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October September 2016

List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October September 2016 Description of document: Requested date: Released date: Posted date: Source of document: List of National Archives and Records Administration (NARA) Inspector General (OIG) investigations closed October

More information

Comprehensive Study on Cybercrime

Comprehensive Study on Cybercrime Federal Ministry of Justice and 17 August 2016 Consumer Protection German Comments on the Comprehensive Study on Cybercrime (Draft February 2013) The United Nations Office on Drugs and Crime (UNODC) invited

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA. Policy Target No. 1 Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form BOSNIA AND HERZEGOVINA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance,

More information

Cybercrime Criminal Law Definitions and Concepts

Cybercrime Criminal Law Definitions and Concepts Cybercrime Criminal Law Definitions and Concepts How to Criminalize Attacks on Computer Networks and Information Computer Crime and Intellectual Property Section U.S. Department of Justice 1 Overview Introduction

More information

Motorola Mobility Binding Corporate Rules (BCRs)

Motorola Mobility Binding Corporate Rules (BCRs) Motorola Mobility Binding Corporate Rules (BCRs) Introduction These Binding Privacy Rules ( Rules ) explain how the Motorola Mobility group ( Motorola Mobility ) respects the privacy rights of its customers,

More information

Incident Handling. Week 4: Incidents, Evidence and the Law

Incident Handling. Week 4: Incidents, Evidence and the Law Incident Handling Week 4: Incidents, Evidence and the Law George Berg & Jagdish S. Gangolly University at Albany 4/27/04 Incident Handling (G. Berg & J. Gangolly) 1 Road Map What is digital evidence? What

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: CODE NO. : SEMESTER: Fall 2011 PROGRAM: AUTHOR: Computer Engineering Technologist - Networking Dan Kachur

More information

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT

California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT California Code of Regulations TITLE 21. PUBLIC WORKS DIVISION 1. DEPARTMENT OF GENERAL SERVICES CHAPTER 1. OFFICE OF THE STATE ARCHITECT SUBCHAPTER 2.5. VOLUNTARY CERTIFIED ACCESS SPECIALIST PROGRAM Program

More information

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form

Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form Global Alliance Against Child Sexual Abuse Online 2014 Reporting Form CROATIA Policy Target No. 1 Enhancing efforts to identify victims and ensuring that they receive the necessary assistance, support

More information

Introduction to Information Technology ITP 101x (4 Units)

Introduction to Information Technology ITP 101x (4 Units) Objective Concepts Introduction to Information Technology ITP 101x (4 Units) Upon completing this course, students will: - Understand the fundamentals of information technology - Learn core concepts of

More information

Criminal Justice Statistics on Cybercrime & Electronic Evidence

Criminal Justice Statistics on Cybercrime & Electronic Evidence Criminal Justice Statistics on Cybercrime & Electronic Evidence Ghanaian Private Sector in Perspective & International Best Practices Albert Antwi-Boasiako, e-crime Bureau PRESENTATION OUTLINE Overview

More information

MANAGEMENT of INFORMATION SECURITY Third Edition

MANAGEMENT of INFORMATION SECURITY Third Edition MANAGEMENT of INFORMATION SECURITY Third Edition CHAPTER AW AND THICS In law a man is guilty when he violates the rights of others. In ethics he is guilty if he only thinks of doing so. Immanuel Kant Upon

More information

Thailand Initiatives and Challenges in Cyber Terrorism

Thailand Initiatives and Challenges in Cyber Terrorism Thailand Initiatives and Challenges in Cyber Terrorism Agenda Cyber-Terrorism weapons & tactics MICT Cyber Inspector Group IT Laws Development Challenges Cyber-Terrorism weapons & tactics What is Cyber-Terrorism?

More information

Report Exec Administrator

Report Exec Administrator Report Exec Administrator Clery Act Public Crime Log From 11/1/2017 To 11/30/2017 RESIDENCE HALL WEST (RH4) - 955 NORTH LOOP ROAD : RECREATION FACILITY WEST 11/3/2017 11:29 AM 11/2/2017 09:05 PM and 11/3/2017

More information

Course Syllabus. Course Information

Course Syllabus. Course Information Course Syllabus Course Information Course: MIS 6326 Data Management Term: Fall 2015 Section: 002 Meets: Monday and Wednesday 2:30 pm to 3:45 pm JSOM 11.210 Professor Contact Information Instructor: Email:

More information

Data Protection and Cybercrime Challenges

Data Protection and Cybercrime Challenges Data Protection and Cybercrime Challenges (Preliminary Presentation) Sigrid Arzt Commissioner IFAI, Mexico Octopus Conference 6-8 June 2012 Strasbourg, France DATA PROTECTION IN MEXICO: A BRIEF OVERVIEW.

More information

Oklahoma State University Institute of Technology Online Common Syllabus Fall 2018

Oklahoma State University Institute of Technology Online Common Syllabus Fall 2018 Oklahoma State University Institute of Technology Online Common Syllabus Fall 2018 ITD 1213 Hardware Systems Support Focuses on the management and maintenance of hardware and operating system environments.

More information

Legal Foundation and Enforcement: Promoting Cybersecurity

Legal Foundation and Enforcement: Promoting Cybersecurity Legal Foundation and Enforcement: Promoting Cybersecurity Regional Workshop on Frameworks for Cybersecurity and Critical Information Infrastructure Protection February 19, 2008 Mark L. Krotoski Computer

More information

TELEPHONE AND MOBILE USE POLICY

TELEPHONE AND MOBILE USE POLICY TELEPHONE AND MOBILE USE POLICY Date first approved: 9 December 2016 Date of effect: 9 December Date last amended: (refer Version Control Table) Date of Next Review: December 2021 First Approved by: University

More information

Red Flag Regulations

Red Flag Regulations Red Flag Regulations Identity Theft Put In Context Overview of Topics Red Flag Regulations Overview How UM Protects Information What is the Student Workers role in identity theft prevention? What s this

More information

Magna5 reserves the right to make modifications to this policy at any time.

Magna5 reserves the right to make modifications to this policy at any time. INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy specifies the actions prohibited by Magna5 to users of the Magna5 Network or the networks of third-party providers. Magna5 reserves the right to

More information

This will allow candidates for whom travelling to a Prometric Test Center is not convenient or possible an opportunity to pursue EDGE certification.

This will allow candidates for whom travelling to a Prometric Test Center is not convenient or possible an opportunity to pursue EDGE certification. On-line Proctoring Bulletin EDGE Examination E X C E L L E N C E I N D E S I G N F O R G R E A T E R E F F I C I E N C I E S IFC (International Finance Corporation), a member of the World Bank Group, and

More information

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way. 1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the

More information

NASD NOTICE TO MEMBERS 97-58

NASD NOTICE TO MEMBERS 97-58 NASD NOTICE TO MEMBERS 97-58 NASD Regulation Requests Comment On Proposed Interpretive Material 1031 Regarding Cold Calling Activity; Comment Period Expires October 31, 1997 Suggested Routing Senior Management

More information

Cybercrime and e-evidence: challenges and solutions.

Cybercrime and e-evidence: challenges and solutions. Cybercrime@Octopus Ministry of Communications Workshop on Cybercrime and Cybersecurity for selected Members of Parliament (KAIPTC, Accra, Ghana, 25 October 2018) Cybercrime and e-evidence: challenges and

More information

National Communications Authority

National Communications Authority National Communications Authority - Press Release The International Workshop on Criminal Justice Statistics on Cybercrime and Electronic Evidence Opens in Accra A three-day International Workshop on Criminal

More information

MENTAL RETARDATION BULLETIN

MENTAL RETARDATION BULLETIN MENTAL RETARDATION BULLETIN COMMONWEALTH OF PENNSYLVANIA DEPARTMENT OF PUBLIC WELFARE DATE OF ISSUE September 6, 2001 EFFECTIVE DATE September 6, 2001 NUMBER 00-01-06 SUBJECT: BY: Announcement of Certified

More information

GhostFiber Acceptable Use Policy

GhostFiber Acceptable Use Policy GhostFiber Acceptable Use Policy Blue Sky Satellite & Theater Services LLC, dba Blue Sky Satellite, dba GhostFiber provides a variety of Internet Services (GhostFiber ) to both residential and business

More information

Ethical, legal, and policy issues related to security and privacy research and practice

Ethical, legal, and policy issues related to security and privacy research and practice Ethical, legal, and policy issues related to security and privacy research and practice Things to consider Criminal law Civil law University policy Community standards for ethics Criminal and civil law

More information

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010

SI Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 University of Michigan Deep Blue deepblue.lib.umich.edu 2010-08 SI 510 - Special Topics: Data Security and Privacy: Legal, Policy and Enterprise Issues, Winter 2010 Blumenthal, Don Blumenthal, D. (2010,

More information

Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005

Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005 IT Guidelines Guidelines for the use of the IT infrastructure at the University of Bayreuth 10 February 2005 In accordance with Article 32 para 3 sentence 1 of the Bavarian Higher Education Act (Bayerisches

More information

Computer forensics Aiman Al-Refaei

Computer forensics Aiman Al-Refaei Computer forensics Aiman Al-Refaei 29.08.2006 Computer forensics 1 Computer forensics Definitions: Forensics - The use of science and technology to investigate and establish facts in criminal or civil

More information

CIT110 A+ Hardware Spring 2015

CIT110 A+ Hardware Spring 2015 CIT110 A+ Hardware Spring 2015 Instructor: Laura Pike Email: laura.pike@gbcnv.edu Phone: 775-753-2288 Office: HTC 131 Office Hours: Monday and Tuesday 9:00 11:00 am, Thurs. 4:00-5:00 pm LabSim: ISBN: 978-1-935080-42-8,

More information

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP) All customers should read this document. You are responsible for the policy written here, and your account WILL BE DISABLED WITHOUT WARNING

More information

China and International Governance of Cybercrime

China and International Governance of Cybercrime China and International Governance of Cybercrime Prof. Dr. Shenkuo WU Law Professor of CCLS, Beijing Normal University Head of Research Centre of Internet Society of China Consultant of Supreme Court of

More information

CSCO 120 CCNA Internetworking Fundamentals Spring 2018

CSCO 120 CCNA Internetworking Fundamentals Spring 2018 CSCO 120 CCNA Internetworking Fundamentals Spring 2018 Instructor: Joseph Cheung Email: joseph.cheung@gbcnv.edu Phone: 775-753-2307 Office: HTC 132 Office Hours: Fri. and Saturday, 4:00 8:00 pm, Monday

More information

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03883) VERSION: 1/23/2015

THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and Digital Forensics SPRING 2015 Unique#: (03883) VERSION: 1/23/2015 THE UNIVERSITY OF TEXAS AT AUSTIN MIS373 e-discovery and SPRING 2015 Unique#: (03883) VERSION: 1/23/2015 Instructor : Juan Reyes, Lecturer Class times : Monday and Wednesday, 3:30-5:00pm Class location

More information

STUDY GUIDE: MASTER S DEGREE IN INTERNATIONAL ECONOMICS AND PUBLIC POLICY

STUDY GUIDE: MASTER S DEGREE IN INTERNATIONAL ECONOMICS AND PUBLIC POLICY STUDY GUIDE: MASTER S DEGREE IN INTERNATIONAL ECONOMICS AND PUBLIC POLICY This version: August 01, 2012 This study guide informs you about the rules and policies for the Master s program in International

More information

IS Today: Managing in a Digital World 9/17/12

IS Today: Managing in a Digital World 9/17/12 IS Today: Managing in a Digital World Chapter 10 Securing Information Systems Worldwide losses due to software piracy in 2005 exceeded $34 billion. Business Software Alliance, 2006 Accessories for war

More information

Internet Service Provider Agreement

Internet Service Provider Agreement Internet Service Provider Agreement 1. Introduction By using this Internet service ( Service ) you agree to be bound by this Agreement and to use the Service in compliance with this Agreement, our Acceptable

More information

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services.

TERMS OF USE Terms You Your CMT Underlying Agreement CMT Network Subscribers Services Workforce User Authorization to Access and Use Services. TERMS OF USE A. PLEASE READ THESE TERMS CAREFULLY. YOUR ACCESS TO AND USE OF THE SERVICES ARE SUBJECT TO THESE TERMS. IF YOU DISAGREE OR CANNOT FULLY COMPLY WITH THESE TERMS, DO NOT ATTEMPT TO ACCESS AND/OR

More information

Cyber Attacks and Data Breaches: A Legal and Business Survival Guide

Cyber Attacks and Data Breaches: A Legal and Business Survival Guide Cyber Attacks and Data Breaches: A Legal and Business Survival Guide August 21, 2012 Max Bodoin, Vince Farhat, Shannon Salimone Copyright 2012 Holland & Knight LLP. All Rights Reserved What this Program

More information