Home » essay examples » 33577419

33577419

Security Awareness and Training Program (for Nancy Johnson and other similarly situated employees)

Nancy Manley and other staff were terminated from their jobs by the officer of the business, US Bancorp Comprehensive Welfare Benefit Prepare Committee. The “Cause” of Johnson’s termination of work is “willful and major misconduct”, the moment Johnson accessed the data of her supervisor containing the 2002 performance level of the company’s personnel.

When Meeks was refused the severance payment (she was able to get a file that contains the suggested merging people Bancorp with another company – a lot of employees can be terminated with severance repayment, except individuals who were associated with gross misconduct), she requested for a overview judgment to the district courtroom.

The region court preferred Johnson fighting that the organization did not set up a security info system that could prevent personnel from accessing the documents of the organization. The committee though wrote an appeal to the routine court fighting that the court erred in the interpretation in the provisions in the plan. The circuit courtroom agreed to the arguments from the committee, quarrelling that as no official interpretation regarding the use of the terms “willful and major misconduct”, the administrator of the plan may apply these terms to similar conditions. The severance payment to Johnson was therefore refused.

Information security awareness and training applications then needs to be designed depending on the apparent Computer Fraudulence and Abuse Act of 1984. The statute “criminalizes unauthorized use of a ‘protected computer’ with all the intent to get information, defraud, obtain anything of value or cause damage to a computer” (Security Awareness Laws and regulations, http://www.massachusetts.edu/lawsfaq/faq.cfm#7).� The so-called ‘protected computer’ is actually a computer intended for foreign or perhaps communication uses (as regarding the plaintiff) and for interstate interaction. Devoid of authorization through the Department of Defense and also the Foreign Affairs, accessing data from stated institutions is deemed illegal.

Also go through: Explain Legalities, Policies and Procedures Strongly related Assessment

Showing of passwords, computer scam, and harm of necessary federal information are also deemed illegal. What the law states was prolonged to include private computers. When it comes to the accused (the corporation), it must start narrower meanings as to the terms “willful and gross wrong doings. ” This will likely definitely as well narrow the options for employees who have are being able to access important information from the company’s data source. The employees must be first knowledgeable ( simply by memorandum) from the sites permitted to use during office work.

Protection Awareness and Training Program (for Scott Moulton)

The individual, Scott Moulton accused the defendant of probing the former’s network of clients. Defendant says statements from Moulton regarding the defendant had been defamatory. 1st is the assertion made by Moulton to C. J. Johns, information systems manager intended for the Cherokee County’s Sheriff’s Office (December 19, 1999) that defendant had developed security hazards and that defendants network personnel were stupid. The second is the statements made by Moulton that the way defendant planned to connect the Police Department to two systems created a secureness risk from the web. Lastly, statements from the individual said that defendant’s network acquired created a secureness risk.

The plaintiff nevertheless argued these statements were merely viewpoints. People might agree or disagree while using statements produced. The court though granted the accused summary common sense for the failure of the plaintiff to perform a place test in the project. The plaintiff was also awarded a summary view for the failure in the defendant to minimize the security hazards.

The US Our elected representatives passed a bill on Come july 1st 2004, saying that internet probing of contractors to government websites (contractors properly approved to negotiate pertaining to the construction of website contacts between government offices) can easily be legal on 3 counts: 1) probing does not in any way generate security risks for the federal government office included, 2) the probing may not result to malversation of any kind of public information, and 3) this sort of probing has to be requested by the client federal government office, with approval from its head office. Although case was obviously a posteriori because the bill was passed prior to the case was filed, it could be good for government offices to follow the guidelines from the law online probing of intergovernmental office buildings. Hence, legislation analysts saw the law because the “most Balearic” guard of the authorities from hackers.

Security Understanding and Training curriculum (for Dewey Watkins)

The plaintiff, Dewey Watkins wanted the region court to cancel a computer access code that had been given to him and had been used (with the supervisor’s approval) simply by another authorized employee. The code offered access to private records taken care of for Tennessee’s Medicaid Plan. The individual argued that the action from the supervisor broken the privacy provision of the state regulation. The plaintiff also charged EDS of terminating his employment if the former rejected to take part in the “illegal” conduct. � The signal court nevertheless affirmed the decision of the district court to grant overview judgment in support of EDS, because Tennessee legislation does not turmoil with the standard provision from the Confidentiality Law.

There was zero proof that other personnel also use the computer access code, and if there is such a case, it would be legal. It is popular that the same law talked about in case one particular also does apply in this case. Showing of passwords to access open public documents is clearly prohibited by law. However, although the conditions “public information” was the concentrate of the the case, it has to be taken into account that accumulated are info that have direct link to people in general. This kind of constitutes authorities programs, tactical social and economic preparing, and of course interstate activities. Security awareness programs must be based on the definition of public information in order to vindicate any instances of writing passwords or perhaps revealing info from government-locked and guaranteed database.

References

Nancy L. Johnson v. US Bancorp … United States Court of Appeals intended for the 8 Circuit. Charm from the United States District Court of the Region of Minnesota. September being unfaithful, 2005.

Reliability Awareness Laws. 2006. School of Ma. URL http://www.massachusetts.edu/lawsfaq/faq.cfm#7. Retrieved September 14, 2007.

Scott Allen Moulton and Network Set up Computer Companies, Inc., Injured parties v. VC3, Defendant. Usa District Court, Atlanta Department.

Watkins versus. EDS. NO . 1: 00-CV-434-TWT. United States Court of Speaks No . 03-6353. United states Court of Appeals for the Sixth Signal. November 2, 2004.

< Prev post Next post >
Category: Essay examples,

Words: 1120

Published: 01.14.20

Views: 512