Business Finance
American Military University Laws Related to Computer Crimes Questions

American Military University

Question Description

I’m working on a Business Law question and need guidance to help me study.

Research the following laws that relate to computer crime. Write an 8-12 page paper discussing the role they play in computer crime.

Be sure to research and document cases to support each law.

Submission Instructions:

Be sure to research and document cases to support each law and your discussion.

1) Health Insurance Portability and Accountability Act (HIPAA)
2) Sarbanes-Oxley Act of 2002 (Sarbox)
3) Children's Online Privacy Protection Act of 1998 (COPPA)
4) California Database Security Breach Act of 2003
5) The Computer Security Act
6) The Privacy Act of 1974
7) Uniform Electronic Transactions Act
8) Electronic Signatures in Global and National Commerce Act
9) Uniform Computer Information Transactions Act

Submit your Term Paper in a Word file for grading.

Specific Instructions for the Term Paper:

  1. Include a title page for your own paper. This includes the “Running Head” in the page header, the title of your paper, and your name. If you don’t know how to edit a header in Word, Google for instructions on how to edit a header in the version of Word you are using and follow the instructions. Also add the university and class info as well as the date authoring the paper.
  2. Write a 150-250 word abstract for your paper (on p. 2 of the Term Paper). The abstract should be a brief summary of your paper.
  3. Next, you need a Table of contents page.
  4. Next, you will start the paper. The 8-12 page starts counting from this page. All prior pages are pages for "metadata" information about the paper - and not part of the body of the paper.
  5. For each major section of the paper, you will need to add sub-headings. You may have as many sub-headings as needed. Be sure to be descriptive in your sub-heading names, so that the content following the sub-heading is informative.
  6. More info on the body of the paper: Your full 8-12 page term paper is due at the end of Week 4. In addition to the 8-12 pages of the paper itself, you must include a title page (abstract and table of contents pages) and a reference page. Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor's name, as well as the university info and the date paper was written.
  7. Your paper must be on the topic of this assignment in computer forensics. Remember to explain the types of software you would use to complete the case. You may use the cases noted in the book for guidance or may use one of your own.
  8. The last section of your paper is the list of references in APA Style format. Name the header "References" then list the references in alphabetical order of the authors' last name. Include a minimum of 6-10 outside sources cited and referenced in the paper. Your reference page must be written in APA citation style.
  9. Rename your Term Paper to ISSC621_LastnameFirstname_TermPaper1.doc(x) (e.g., ISSC621_JohnSmith_TermPaper1.docx) and submit it to the Assignments area in the classroom.

NOTE: This assignment has the classroom TII (TurnItIn) feature turned on. This means that once your assignment has been submitted to this area, it will automatically be submitted to Turnitin.com database to generate an Originality Report with an Originality Index. It takes anywhere from a minute to 24 hours (or longer) for this report to be generated and returned to the classroom assignment area. Check often to see if the report has been generated.

Assignments are due by 11:55 PM Eastern Time of Sunday of the week assigned.

Using at least 500 words - summarize the article you have chosen. You will be graded on Content/Subject Knowledge, Critical Thinking Skills, Organization of Ideas, and Writing Conventions. Submit your assignment in Microsoft Word format and include a Cover Page and Reference page (not included in the word count).

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Running head: LAW AND COMPUTER CRIMES

In-Depth Look at Some of The Laws Related to Computer Crimes
Student’s Name
Institutional Affiliation

1

LAW AND COMPUTER CRIMES

2

Abstract
Technology has, for a long time, caused both benefits and nuances to the different sectors of
its applications. From corporate projects to personal communications. Over the years, the
concern over electronic use and the growth of the impacts of information technology has
received a significant widespread across the globe. Healthcare and corporate institutions
continue to experience an increase in the use of technology across its different continuums.
However, the U.S. federal government has made several attempts to create laws that will help
reduce the incidences of the threats to the security and privacy f sensitive information stored
in both public and non-government computers. Although some of these statutory Acts have
received controversial critics, their impact n reducing the effects of computer crimes is
undeniably substantial. Therefore, to support the efforts of these laws, and as responsible
citizens, it would be best if each person contributes towards a safe and secure technological
world.

LAW AND COMPUTER CRIMES

3

Contents
Introduction .............................................................................................................................. 4
Health Insurance Portability and Accountability Act (HIPAA) ......................................... 4
The entities covered by HIPPA ........................................................................................... 5
HIPPA protects which type of information ....................................................................... 5
The primary function of HIPPA ......................................................................................... 5
Cases involving HIPPA violations ...................................................................................... 6
Sarbanes-Oxley Act of 2002 (Sarbox) .................................................................................... 6
The relevance of I.T. under SOX ........................................................................................ 7
Children's Online Privacy Protection Act of 1998 (COPPA) .............................................. 7
California Database Security Breach Act of 2003 ................................................................ 8
The Computer Security Act .................................................................................................... 8
The Privacy Act of 1974 .......................................................................................................... 9
The Privacy Act of 1974 in practice ................................................................................... 9
Uniform Electronic Transactions Act .................................................................................... 9
Electronic Signatures in Global and National Commerce Act .......................................... 10
Uniform Computer Information Transactions Act ............................................................ 10
Conclusion .............................................................................................................................. 11
References ................................................................................................................................ 12

LAW AND COMPUTER CRIMES

4

In-Depth Look at Some of The Laws Related to Computer Crimes
Introduction
Technology has, for a long time, caused both benefits and nuances to the different
sectors of its applications. From corporate projects to personal communications. Over the
years, the concern over electronic use and the growth of the impacts of information
technology has received a significant widespread across the globe. Healthcare and corporate
institutions continue to experience an increase in the use of technology across its different
continuums. Noteworthy, the benefits are worth the rise in the use of technolo...

DoctorVenus (14620)
UCLA

Anonymous
I was on a very tight deadline but thanks to Studypool I was able to deliver my assignment on time.

Anonymous
The tutor was pretty knowledgeable, efficient and polite. Great service!

Anonymous
I did not know how to approach this question, Studypool helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags