University Assignment: Computer Law, Crime, and Investigation Report

Verified

Added on  2022/09/27

|5
|733
|26
Report
AI Summary
This report provides an overview of computer law, crime, and investigation, focusing on two key areas: information security law and privacy law. The report delves into the Health Insurance Portability and Accountability Act (HIPAA), explaining its role in protecting electronic protected health information (EPHI) and the security measures required for compliance, including administrative, physical, and technical controls. It also examines privacy laws, specifically the California Consumer Privacy Act (CCPA), and its purpose in safeguarding consumer data. The report highlights the importance of data privacy and the legal frameworks designed to prevent identity theft and financial loss, offering insights into how businesses and individuals can protect sensitive information. It references relevant literature, including the work of Cohen & Mello (2018) and Goldman (2019), to support its analysis of these critical legal aspects.
Document Page
Running head: COMPUTER LAW, CRIME AND INVESTIGATION
COMPUTER LAW, CRIME AND INVESTIGATION
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1COMPUTER LAW, CRIME AND INVESTIGATION
Table of Contents
Information security law:.................................................................................................................2
Privacy Law:....................................................................................................................................2
References:......................................................................................................................................4
Document Page
2COMPUTER LAW, CRIME AND INVESTIGATION
Information security law:
The formal practice of protecting information from unauthorized access of unknown
entities such that the misuse, disruption, destruction or modification of the data can be restricted
is known as the information security. There are certain laws that are enforced for the purpose of
the protection of information. One such law is the HIPAA Act.
This act was first determined by the United States of America where President Bill
Clinton passed the law. HIPAA or the Health Insurance Portability and Accountability Act
consists of a part, Administrative Simplification Rules which is used for securing information in
IT. The employee details that are in the system is protected with the help of this act. The national
standards that the employees have to follow in order to be in the system is also determined by
HIPAA. The HIPAA security rule was issued in 2003, February 20 (Cohen & Mello, 2018). The
rule emphasizes upon the EPHI or the Electronic Protected Health Information solely. The
HIPAA act is valid for all the companies that provides health coverage to its employees. There
are certain things that has to be kept in mind while implementation of the HIPAA. These are
security updates and reminders, software for protection against the malware, monitoring of the
log in details and lastly the password management. This act is one of the most expansive
collection of the laws and is still in the process of evolution. The latest updates brings about
changes that can be more beneficial for the purpose of protection in the system. To sum it up,
HIPAA covers Administrative, Physical and technical control of the information security that is
necessary for the system (O'Brien & Daniel, 2015).
Document Page
3COMPUTER LAW, CRIME AND INVESTIGATION
Privacy Law:
Information privacy or data privacy is the an aspect of the information system that helps
in determining which data can be shared with the third party such that the sensitive data can be
protected. The individuality and the autonomy of a person can be maintained with the help of the
privacy. The privacy acts are passed in order to maintain the secrecy of the data that is provided
by the consumers. The personal information like transaction details, individual details like the
CVV pins, identity card numbers and many more need maximum protection for prevention
against the identity theft or financial loss. CCPA is one of the privacy protection policy (Young
& Henley, 2019).
CCPA or the California Consumers Privacy Act is one of the policy developed for the
residence of the place for protection of their data privacy. The bill was passed by Jerry Brown,
the then Governor of California, 2018 (Goldman, 2019). The goal of the act was make the
residents aware that sensitive data are being collected; the right of the residents to know who are
visiting their information; right to request for deletion of data after completion of the task. Any
business having a gross revenue of $25 million can apply this act to protect the privacy of the
employee and the consumer data. Apart from that, company that possess information of more
than 50000 consumer or more can apply this act.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4COMPUTER LAW, CRIME AND INVESTIGATION
References:
Cohen, I. G., & Mello, M. M. (2018). HIPAA and protecting health information in the 21st
Century. Jama, 320(3), 231-232.
Goldman, E. (2019). An Introduction to the California Consumer Privacy Act (CCPA). Santa
Clara Univ. Legal Studies Research Paper.
O'Brien, E., & Daniel, F. (2015). HIPAA in the Context of Civil Commitments. Available at
SSRN 2571982.
Young, J., & Henley, D. (2019). CCPA.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]