Liv2 - Social Issues Involving Computers Computers, Work and Health Stress Related Concerns: Layoff or Reassignment Fear of Falling Behind Burnout Ergonomics Related Concerns: Display Devices Keyboards Work Space Design Environment Related Concerns: Power Use Pollution Computer Crime Types of Computer Crime: Data Diddling Trojan Horse Spoofing Salami Shaving Trapdoors Logic and Time Bombs Computer Viruses Eavesdropping (Sniffer Programs') Cellular Phone Fraud Software Piracy Hacking Counterfeiting Internet-Related Crimes Minimizing Computer Crime: Assess Risks Have a Recovery Plan Hire Trustworthy People Beware of Malcontents Separate Employee Functions Restrict System Use Password Protect Programs and Data Build Firewalls Secure Transmissions with Encryption Use Crime-Prevention Software Devise Staff Controls Monitor Important System Transactions Conduct Regular Audits Educate Employees Crime Legislation: Computer Fraud and Abuse Act of 1984 Computer Fraud and Abuse Act of 1986 Computer Abuse Amendments Act (1994) National Information Infrastructure Protection Act (1996) No Electronic Theft (NET) Act (1998) Identify Theft and Assumption Deterrence Act of 1998 USA Patriot Act (USAPA) (2001) Sarbanes-Oxley Act (2002) Homeland Security Act (2002) Health Insurance Portability and Accountability Act (HIPAA) (2003) PROTECT Act (2003) Fair and Accurate Credit Transactions Act (FACTA) (2003) Makes it a crime to break into computers owned by the federal government. Amends the 1984 law to include federally regulated financial institutions. Amends the Computer Fraud and Abuse Act of 1984 to include viruses and other harmful code. Amends the Computer Fraud and Abuse Act of 1984 to punish information theft crossing state lines and crack down on network trespassing. Expands computer piracy laws to include distribution of copyrighted materials over the Internet. Makes it a federal crime to knowingly use someone else’s means of identification, such as name, Social Security Number, or credit card, to commit any unlawful activity. Grants federal authorities expanded surveillance and intelligence gathering powers, such as broadening the ability of federal agents to obtain the real identity of Internet users, intercept e-mail and other types of Internet communications, follow online activity of suspects, expand their wiretapping authority, and more. Requires archiving a variety of electronic records and protecting the integrity of corporate financial data. Includes provisions to combat cyberterrorism, including protecting ISP’s against lawsuits from customers for revealing private information to law enforcement agencies. Includes a Security Rule that sets minimum security standards to protect health information stored electronically. Includes provisions to prohibit virtual child pornography. Amends the Fair Credit Reporting Act (FCRA) to require, among other things, that the three nationwide Identity (2004) Theft Penalty Enhancement Act Computers and Privacy Privacy and Electronic Mail Privacy and Marketing Databases Caller Identification Privacy Legislation Ethical Issues Regarding Computers consumer reporting agencies (Equifax, Experian, and TransUnion) provide to consumers, upon request, a free copy of their credit report once every 12 months. Adds extra years to prison sentences for criminals who use identity theft (including the use of stolen credit card numbers) to commit other crimes, including credit card fraud and terrorism.