X hits on this document

Powerpoint document

Cyber Security - the Laws that Govern Incident Response - page 8 / 38

112 views

0 shares

0 downloads

0 comments

8 / 38

2c. Monitoring Communications During an Incident; Generally

Without a court order - cannot intercept contents unless an exception applies; it’s a wiretap.

Three key exceptions (no REP):

Provider Exception, 18 U.S.C. § 2511(2)(a)(i)

To protect the rights and property of the system under attack

Consent, 18 U.S.C. § 2511(2)(c)

Consent from one of the parties to the communication

Computer Trespasser Exception, 18 U.S.C. § 2511(2)(i)

Trespasser – accesses computer w/o authorization

Can intercept information “transmitted to, through or from the protected computer”

Document info
Document views112
Page views112
Page last viewedSat Dec 10 03:11:45 UTC 2016
Pages38
Paragraphs396
Words2817

Comments