| < Day Day Up > |
|
Labor organization, employee, 63
LANs, see Local area networks
Laser printer, 476
Law enforcement agents, risk assessment reviews by, 38
Lawyers, risk assessment reviews by, 38
Lazy writing, 279
Least privilege, 113, 391
Legal matters, 341-379
civil suits, 374-375
civil discovery, 376, 377
civil process, 375-376
e-mail discovery, 376-377
federal laws applicable to computer-related crimes, 378-379
plaintiff's burden of proof, 375
common types of unlawful acts, 343
cost of computer crime, 357-358
criminal law, 358-374
allegations, 359
appeals, 374
computer evidence, 366-367
court orders, 364-365
criminal discovery, 371-372
criminal plea bargains, 373
criminal procedure, 370-371
defense arguments relative to expert witnesses, 366
electronic discovery, 372
e-mail as evidence, 372-373
evidence, 370
expert testimony, 365
federal legal requirements for electronic surveillance, 367
grand juries, 360-361
investigation, 359
means of collecting electronic evidence under federal statutes, 367
search warrants, 362-364
sentencing, 374
subpoenas and summons, 361-362
testimony, 365
trials, 373-374
witnesses, 359-360
evidence collection, preservation, analysis, and introduction at trial, 356-357
fraud in workplace, 354-356
accountability, 355
employee fraud controls, 355
management functions in fraud control, 355
records, 356
intellectual property, 343-354
copyright infringement, 345
copyright protection, 345
criminal actions in copyright cases, 345
criminal copyright forfeiture, 346
criminal forfeiture, 353-354
criminal prosecution for trafficking in counterfeit goods or services, 346
cybersquatters, 349
cybersquatter-victim protection, 349-351
duration of copyright protection, 345
filing for patent protection, 352
Internet domain names and registered marks, 348
inventor, 351-352
obtaining trade secrets protection, 354
patent ownership, 352
patent protections, 351
patent terms, 352
patent validity, 352
protected trade secrets, 352-353
protected works, 346-347
public notification, 348
qualifications for design patents, 351
qualifications for utility patents, 351
trademark and service mark ownership, 347
trademark and service mark protection, 346, 347
trade secrets, 352
works that can be copyrighted, 344-345
works that cannot be copyrighted, 346
investigators' goals, 342-343
legal functions, 341-342
Legislatures, risk assessment reviews by, 38
LFS, see Log file service
Line-of-authority documentation, 122
Line printer logging, 476
Linux, 139
evidence examination, 297
password-protected user accounts, 102
Listservs, bulletins and, 504
Local area networks (LANs), 99
Log
entries, gaps in, 236
file service (LFS), 279
reviews, 305
Logging
application, 241
file system, 476
line printer, 476
UNIX, 240
Windows, 241, 304
Logic bombs, 316
| < Day Day Up > |
|