Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Discuss different laws related to IT Strategy and Policy. Pick one of the laws,

ID: 3907855 • Letter: D

Question

Discuss different laws related to IT Strategy and Policy.
Pick one of the laws, regulations, or standards and conduct additional research on it.
Provide a 1-2 page paper explaining the law or regulation. You should address the following:
*What are the key concepts contained in the law/regulation?
*How does it impact an organization and it’s IT infrastructure?
*What policy, technical or procedural controls do the law/regulation require?
*Why are those drivers important for the business?
*How those drivers benefit the organization and help it meet its goals?

Explanation / Answer

Answer)

Laws related to IT Strategy and Policy:

Copyright Act of 1976—an update to U.S. Copyright Law (17 USC)

-- Protects intellectual property, including publications and software

Copyright Act of 1976 is a US law which the primary copyright law in the country. The Act was public in 1976 and came in effect on January 1, 1978. Also, the act protects the copyright laws of the intellectual property such as publications, software and others and lists the rights to the copyright holders. Copyright protection was given to any tangible medium of expression which can be perceived and communicated to another by any means containing music works, drama, sound recording, graphic works and many other categories.

Computer Fraud and Abuse Act (also known as Fraud and Related Activity in Connection with Computers; 18 USC 1030)

-- Defines and formalizes laws to counter threats from computer-related acts and offenses (amended in 1996, 2001, and 2006)

The Computer Fraud and Abuse Act is a US cyber security law which is used to counter threats in computer-related terms and offenses and prohibits the use of the computer without correct authorization and illegal use of the computer to provide harm and stealing information. The Computer Fraud and Abuse Act protects when users have knowingly accessed computers having computer without authorization or exceeding their level of authorization. Also, thereby if the user obtains any specific or confidential information from the computer. Damages to the computers with intent of fraud and stealing information. Defrauding computer traffic to and from a computer. Extortion of money and others causing threat to any users. The Computer Fraud and Abuse Act protects all frauds and abuses regarding the computers as a criminal law and a statute which allows the individuals to sue the attackers or damages money to recover the money from the damages.

The All Writs Act of 1789 authorizes the US Courts to issue measures necessary in order to aid the respective jurisdictions and agree to the law. The law has been revived to gain access to encrypted and protected mobile phones for terrorist investigations.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote