Index_L

 < Day Day Up > 



L

Labor organization, employee, 63

LANs, see Local area networks

Laser printer, 476

Law enforcement agents, risk assessment reviews by, 38

Lawyers, risk assessment reviews by, 38

Lazy writing, 279

Least privilege, 113, 391

Legal matters, 341-379

civil suits, 374-375

civil discovery, 376, 377

civil process, 375-376

e-mail discovery, 376-377

federal laws applicable to computer-related crimes, 378-379

plaintiff's burden of proof, 375

common types of unlawful acts, 343

cost of computer crime, 357-358

criminal law, 358-374

allegations, 359

appeals, 374

computer evidence, 366-367

court orders, 364-365

criminal discovery, 371-372

criminal plea bargains, 373

criminal procedure, 370-371

defense arguments relative to expert witnesses, 366

electronic discovery, 372

e-mail as evidence, 372-373

evidence, 370

expert testimony, 365

federal legal requirements for electronic surveillance, 367

grand juries, 360-361

investigation, 359

means of collecting electronic evidence under federal statutes, 367

search warrants, 362-364

sentencing, 374

subpoenas and summons, 361-362

testimony, 365

trials, 373-374

witnesses, 359-360

evidence collection, preservation, analysis, and introduction at trial, 356-357

fraud in workplace, 354-356

accountability, 355

employee fraud controls, 355

management functions in fraud control, 355

records, 356

intellectual property, 343-354

copyright infringement, 345

copyright protection, 345

criminal actions in copyright cases, 345

criminal copyright forfeiture, 346

criminal forfeiture, 353-354

criminal prosecution for trafficking in counterfeit goods or services, 346

cybersquatters, 349

cybersquatter-victim protection, 349-351

duration of copyright protection, 345

filing for patent protection, 352

Internet domain names and registered marks, 348

inventor, 351-352

obtaining trade secrets protection, 354

patent ownership, 352

patent protections, 351

patent terms, 352

patent validity, 352

protected trade secrets, 352-353

protected works, 346-347

public notification, 348

qualifications for design patents, 351

qualifications for utility patents, 351

trademark and service mark ownership, 347

trademark and service mark protection, 346, 347

trade secrets, 352

works that can be copyrighted, 344-345

works that cannot be copyrighted, 346

investigators' goals, 342-343

legal functions, 341-342

Legislatures, risk assessment reviews by, 38

LFS, see Log file service

Line-of-authority documentation, 122

Line printer logging, 476

Linux, 139

evidence examination, 297

password-protected user accounts, 102

Listservs, bulletins and, 504

Local area networks (LANs), 99

Log

entries, gaps in, 236

file service (LFS), 279

reviews, 305

Logging

application, 241

file system, 476

line printer, 476

UNIX, 240

Windows, 241, 304

Logic bombs, 316



 < Day Day Up > 



Critical Incident Management
Critical Incident Management
ISBN: 084930010X
EAN: 2147483647
Year: 2004
Pages: 144

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net