Hacker 2883632 960 720

Technological Crime and Cyber Legislation

  • Stored Communications Act (SCA)

    Stored Communications Act (SCA)
    The Stored Communications Act (SCA), enacted in 1986, provides statutory privacy protection for customers of network service providers. The SCA controls how the government can access stored account information from entities such as Internet Service Providers. This was primarily designed to prevent unauthorized government access to private electronic communications.
  • No Electronic Theft Act (NETA)

    No Electronic Theft Act (NETA)
    It provides for criminal prosecution of individuals for copywright infringement, even when there is no monetary profit or commercial benefit. The No Electronic Theft Act, passed in 1997, came as a result of failed prosecution of a college student, David LaMacchia, who provided an online billboard for others to upload and download copyrighted software.
  • Digital Theft Deterrence and Copyright Damanges Improvement Act

    Digital Theft Deterrence and Copyright Damanges Improvement Act
    The Digital Theft Deterrence & Copyright Damages Improvement Act of 1999 is a United States law that increased the possible civil penalties for copyright infringement. It also attempted to clear an administrative hurdle that was preventing the United States Sentencing Commission from implementing the NETA increased criminal penalties for similar offenses. Widespread use of the Internet advent of high-capacity storage media like DVDs could worsen the problem, so increased penalties were needed
  • Cyber Security Enhancement Act (CSEA)

    Cyber Security Enhancement Act (CSEA)
    Cyber Security Enhancement Act of 2002 - Directs the United States Sentencing Commission to review and, if appropriate, amend Federal sentencing guidelines and otherwise address crimes involving fraud in connection with computers and access to protected information, protected computers, restricted data in interstate or foreign commerce, or involving a computer used by or for the Federal Government. This came into effect to demand companies to give information to government officials when asked.
  • Cyber Security Enhancement Act (CSEA II)

    Cyber Security Enhancement Act (CSEA II)
    To provide for an ongoing, voluntary public-private partnership to improve cybersecurity, & to strengthen cybersecurity research & development, workforce development and education, & public awareness &c preparedness etc. Amends the National Institute of Standards &Technology Act to permit the Secretary of Commerce, to facilitate & support the development of a voluntary, consensus-based, industry-led set of standards & procedures to cost-effectively reduce cyber risks to critical infrastructure.
  • Cybersecurity Information Sharing Act (CISA)

    Cybersecurity Information Sharing Act (CISA)
    This bill requires the Director of National Intelligence and the Departments of Homeland Security (DHS), Defense, and Justice to develop procedures to share cybersecurity threat information with private entities, nonfederal government agencies, state, tribal, and local governments, the public, and entities under threats. This came into effect in response to this growing threat and despite sharp criticism from privacy advocates.
  • Cybersecurity and Infrastructure Security Agency Act

    Cybersecurity and Infrastructure Security Agency Act
    CISA is responsible for protecting the nation’s critical infrastructure from physical and cyber threats. After the massive breach of the Office of Personnel Management in 2015, when sensitive personal data on 22 million current and former federal employees was stolen by suspected Chinese hackers, it became increasingly clear to many experts that the DHS wasn't in a strong position to adequately create a national response to the growing threat of foreign attackers infiltrating critical resources.
  • Clarifying Lawful Overseas Use of Data (CLOUD) Act

    Clarifying Lawful Overseas Use of Data (CLOUD) Act
    The Act provides that U.S. law-enforcement orders issued under the Stored Communications Act (SCA) may reach certain data located in other countries. The United States enacted the CLOUD Act to improve procedures for both foreign and U.S. investigators in obtaining access to electronic information held by service providers.