Tuesday, July 6, 2010
Monday, February 22, 2010
Key Provisions of the USA Patriot Act
Section 201-Gives federal officials the authority to intercept wire,spoken and electric communication relating to terrorism.
Section 202-Gives federal officials the authority to intercept wire,spoken and electric communication relating to computer fraud and abuse offenses.
Subsection 203(b)- Permits the sharing of grand jury information that involves foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained a part of a criminal investigation.
Section 204-Makes clear that nothing in the law regarding pen registers- an electric device which records all numbers dialed from particular phone line.
Section 206- Allows federal officials to issue loving "John Doe" wiretaps,which allows investigators to listen in an any telephone.
Section 207- Increases the amount of time that federal officials may watch people they suspect are spies or terrorists.
Section 209- Permits the seizure of voice mail messages under a warrant.
Section 212- Permits Internet Service provides and other electronic communication and remote computing service providers to hand over records and e-mails.
Section 214- Allows use of a pen registers or trap and trace devices that record originating phone numbers of all incoming calls in international terrorism.
Section 215- Authorizes federal officials to obtain "tangible items" like business records ,including those from libraries and bookstores.
Section 217- Makes it lawful to intercept the wire or electronic communication of a computer hacker in certain circumstances.
Section 218- Allows federal officials to wiretap of foreign intelligence gathering is a "significant purpose" for seeking a Federal Intelligence Surveillance Act order.
Section 220- Provides for nationwide service of search warrants for electronic evidence.
Section 223- Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibitions against unauthorized disclosures of information.
Section 225- Amends to prohibit lawsuits against people that provide information to federal official for a terrorism investigation.
SOURCE:( WWW.mail. archive.com/INFOVAERIOR@g2-forward .org
Section 202-Gives federal officials the authority to intercept wire,spoken and electric communication relating to computer fraud and abuse offenses.
Subsection 203(b)- Permits the sharing of grand jury information that involves foreign intelligence or counterintelligence officers the ability to share foreign intelligence information obtained a part of a criminal investigation.
Section 204-Makes clear that nothing in the law regarding pen registers- an electric device which records all numbers dialed from particular phone line.
Section 206- Allows federal officials to issue loving "John Doe" wiretaps,which allows investigators to listen in an any telephone.
Section 207- Increases the amount of time that federal officials may watch people they suspect are spies or terrorists.
Section 209- Permits the seizure of voice mail messages under a warrant.
Section 212- Permits Internet Service provides and other electronic communication and remote computing service providers to hand over records and e-mails.
Section 214- Allows use of a pen registers or trap and trace devices that record originating phone numbers of all incoming calls in international terrorism.
Section 215- Authorizes federal officials to obtain "tangible items" like business records ,including those from libraries and bookstores.
Section 217- Makes it lawful to intercept the wire or electronic communication of a computer hacker in certain circumstances.
Section 218- Allows federal officials to wiretap of foreign intelligence gathering is a "significant purpose" for seeking a Federal Intelligence Surveillance Act order.
Section 220- Provides for nationwide service of search warrants for electronic evidence.
Section 223- Amends the federal criminal code to provide for administrative discipline of federal officers or employees who violate prohibitions against unauthorized disclosures of information.
Section 225- Amends to prohibit lawsuits against people that provide information to federal official for a terrorism investigation.
SOURCE:( WWW.mail. archive.com/INFOVAERIOR@g2-forward .org
Monday, January 25, 2010
COMPUTER PRIVACY
Concerning privacy laws of the United States, privacy is not guaranteed per se by the Constitution of the United States. The Supreme Court of the United States has found that other guarantees have "penumbras" that implicitly grant a right to privacy against government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the right of freedom of speech granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the U.S. by the Privacy Act of 1974, and various state laws.It is like a mirror that shows all tracks of our computer and Internet activity - every time we surf the Internet we leave traces of our Internet activity that can reveal our real-life identity. And anyone even without special computer skills can monitor our surfing habits, banking history and even our personal information like name, phone, address
PRIVACY LAW
Concerning privacy laws of the United States, privacy is not guaranteed per se by the Constitution of the United States. The Supreme Court of the United States has found that other guarantees have "penumbras" that implicitly grant a right to privacy against government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the right of freedom of speech granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Privacy is regulated in the U.S. by the Privacy Act of 1974, and various state laws.
PRIVACY PROTECTION
Claims of privacy protection made by companies may be difficult for consumers to verify, except when they have already been violated.
In a consumer protection approach, in contrast, it is acknowledged that individuals may not have the time or knowledge to make informed choices, or may not have reasonable alternatives available. In support of this view, Jensen and Potts showed that most privacy policies are above the reading level of the average person ] Therefore, this approach advocates greater government definition and enforcement of privacy standards.
What is Privacy?
Privacy is being private; seclusion;secrecy;
one's private life.Not open or controlled by the public;for an individual
person;not holding public office;secret. dd
one's private life.Not open or controlled by the public;for an individual
person;not holding public office;secret. dd
Monday, January 18, 2010
Who are computer criminals and their object?
Some computer criminals are mean and sinister type.
But many more wear business suits,have university degrees,
and appear to be pillars of their communities.
No single profile captures the characteristics of a"typical"
computer criminal,and many who fit the profile are not
criminals at all.
But many more wear business suits,have university degrees,
and appear to be pillars of their communities.
No single profile captures the characteristics of a"typical"
computer criminal,and many who fit the profile are not
criminals at all.