Important Computer Privacy Laws

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Important Computer Privacy Laws:

  • The Council Directive (Law) on Data Protection for the European Union (EU) of 1995 declares that each EU nation is to apply protections similar to those of the OECD Guidelines.
  • The Economic and Protection of Proprietary Information Act of 1996 corresponds to industrial and corporate espionage and expands the definition of property to include proprietary economic information in order to include the theft of this information.
  • The Kennedy-Kassebaum Health Insurance and Portability Accountability Act of 1996  (HIPAA) addresses the concerns of personal health care information privacy, security, transactions and code sets, unique identifiers, and health plan portability in the United States.
  • The National Information Infrastructure Protection Act of 1996 amended the Computer Fraud and Abuse Act of 1986 and is modeled after the OECD Guidelines for the Security of Information Systems. It works with the safeguarding of confidentiality, integrity, and availability of data and systems. This path is designed to encourage other countries to adopt a similar framework, creating a more systematic approach to handling computer crime in the existing global information infrastructure.
  • The Information Technology Management Reform Act (ITMRA) of 1996 is also known as the Clinger-Cohen Act, and frees the General Services Administration of responsibility for procurement of automated systems and contract appeals. OMB is designed to provide guidance, policy, and control for information technology procurement. With the Paperwork Reduction Act, as enhanced, this Act delineates OMB’s responsibilities for overseeing agency practices regarding information privacy and security.
  • The Title I, Economic Espionage Act of 1996 deals with the numerous acts of economic espionage and the national security components of the crime. The theft of trade secrets is also defined in the Act as a federal crime.
  • The Digital Millennium Copyright Act (DMCA) of 1998 inhibits trading, manufacturing, or selling in any way that is designed to override copyright protection mechanisms. It also addresses ISPs that unknowingly support the posting of copyrighted material by subscribers. If the ISP is alerted the material is copyrighted, the ISP must remove the material. Additionally, if the posting party proves that the removed material was of “lawful use,” the ISP must restore the material and notify the copyright owner within 14 business days. Two important rulings regarding the DMCA were made in 2001. The rulings involved DeCSS, which is a program that bypasses the Content Scrambling System (CSS) software used to prevent the viewing of DVD movie disks on unlicensed platforms.

Additional laws follow: 

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?