This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cybersecurity security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cybersecurity security

Stored information act (SCA) that controls the disclosure of electronic information technological providers store. Its purpose is to ensure security, privacy, and disclosure of information in the email and other electronic information. The electronic communication privacy act (ECPA) was passed in 1986 created to avoid access to private electronic communications and computer transmission of electronic information by the unauthorized government. The 99th united states congress enacted this law as public law, 99-508§.

The electronic communication privacy act was intended to prohibit the third party from unauthorizedly accessing and displaying electronic information. This is to say, the act ensures the protection of internet service providers’ customers” privacy rights when their personal and what rather they refer to as private data is disclosed. Also, it ensures justice whenever an uninvolved third part pops into such private information without the information awareness owners as it is regarded as an offense. The act ensures justice to the customers through penalties and fines for the offenses of information. Some of these penalties include; fine of $250000 or imprisonment of one or two years depending on whether the offense is subsequent or first, and a fine of $5000 or imprisonment of not more than six months in any other case.

The electronic communication privacy act has been witnessed in several cases where its law is being applied, and outcomes have been seen to be whether the act is effective or not. For example, in South Carolina supreme court, Jennings’ case where his email had been accessed by his daughter-in-law had made a copy showing how the ECPA had not protected Jennings’ private information by allowing a duplicate copy of the information. The court rejected the Theofel because the recipient decided to hold a duplicate of the email on the specialist co-op’s framework, the held duplicate is no longer in electronic capacity since it is presently don’t in ‘impermanent, middle of the road stockpiling.

Some of the amendments made to the electronic communication privacy act include the communication assistance for law enforcement action,  which aimed to improve the conduction of justice interception by telecommunication devices that were recommended to have in-built capabilities for targeted surveillance by the law enforcement agencies. The amendment has grown because of its effectiveness and is being used even with firms such as the FBI’s digital collection system network to store, analyze, and indexes information for their surveillance purpose. The ECPA can ensure and improve effectiveness by creating awareness to the public on protecting their information.

Identity theft enforcement and restitution act of 2008

This act is an amendment of the federal criminal code of identity theft assumption deterrence that enacts authorization of restitution orders to compensate for victims of identity theft regarding the time spent remediating the damages as well as the actual loss incurred or intended. The law was passed in 2008 by the 110th congress after a sizeable part of the population had reported cases of identity theft that lead to financial strains.

This act has improved the prosecution of identity theft by; forcing criminal and common relinquishments of property used to carry out computer misrepresentation offenses, precluding tricks from perpetrating computer misrepresentation, and extending interstate and unfamiliar ward for an indictment of computer misrepresentation offenses. Also, the act incorporates a scheme to carry out a lawful offense inside the meaning of “lawful offense infringement” for motivations behind irritated data fraud violations and grows fraud and bothered wholesale fraud wrongdoings to incorporate offenses against associations.

The act carries fines and penalties depend on the severity of the crime. The penalties include a minimum of two years and charges levied in any case, whether of felony or transgression. The perpetrator is also commanded to compensate the victim whether for the incurred damage or the lost time probation, where the first time criminal may escape the chance of being jailed by being fined or restitution.

In case anyone’s identity has been stolen, the victim is advised to report immediately that no further harm or damage is incurred and allow the authorities to follow up on the criminal before another victim is involved. Amendments such identity theft penalty enhancement act (ITPEA) purposed to stiffen the fines and penalties for the identity thieves and encourage the victims to follow up on the criminals. The acts have been effective and have lead to a reduced number of reports of identity thefts. Identity theft enforcement act can improve its effectiveness by training the public on how to use security tools such as passwords and credentials.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask