Question

In: Economics

Angel Life Insurance Corporation suffers a security breach in its computer network by one of its...

Angel Life Insurance Corporation suffers a security breach in its computer network by one of its employees. Before the company discovers the breach, the perpetrator obtains corporate financial records and other confidential data, including a list of its insured's names, addresses, social security numbers, and dates of birth. Is this a crime? If so, what are its elements? What statutes might you reference have been violated, if any? Does it matter whether the employee profited or benefitted from the information obtained, or whether it was transferred to a third person?

Solutions

Expert Solution

Yes, it is crime. The element is to intimidate and blackmail employer. Stealing of data is cyber crime under Data Protection Act, Additions to the IT Act in 2008 protect against identity theft (S. 66C), He thefted data of employee, though he violated Data Protection Act under Section 55 also violated Theft Protection Act (S 1408). Offcourse it matters whether the employee profited or benefitted from the information obtained, or whether it was transferred to a third person because it is cyber crime which is against Law and acts which is mentioned above. It is threat for them who's data has been stolen. Also stolen data can harm and damange to employees who's data has been stolen.


Related Solutions

A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift? could u recalculate using 1 probability i think the probability is p(4 breaches tom | 2...
A security consultant has observed that the attempts to breach the security of the companys computer...
A security consultant has observed that the attempts to breach the security of the companys computer system occurs according to a Poisson process with a mean rate of 3 attempts per day. (The system is on 24 hours per day.) (a) What is the probability that there will be four breach attempts tomorrow, and two of them will occur during the evening (eight-hour) shift?
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
Computer and Network Security: List and explain the multilayered IIoT Security Architecture proposed by IIC-IISF?
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
Edible Chemicals Corporation owns a $2 million whole life insurance policy on the life of its...
Edible Chemicals Corporation owns a $2 million whole life insurance policy on the life of its CEO, naming Edible Chemicals as beneficiary. The annual premiums are $72,000 and are payable at the beginning of each year. The cash surrender value of the policy was $22,000 at the beginning of 2018. 1. & 2. Prepare the appropriate 2018 journal entries to record insurance expense and the increase in the investment assuming the cash surrender value of the policy increased according to...
Slappey Communications is a technology firm in Birmingham, Alabama, specializing in telecommunications, computer, and network security....
Slappey Communications is a technology firm in Birmingham, Alabama, specializing in telecommunications, computer, and network security. Its owner, Bill Slappey, invested nearly $770,000 in property, plant, and equipment for the business in 2014 (See “Small Firms Poised to Spend More on Plants, Equipment,” A. Loten and V. Monga, Wall Street Journal, September 3, 2014.) Slappey spent about $100,000 to build a 1,000-square-foot “cloud storage” room, or a warehouse for network servers. Slappey also spent about $670,000 on computers, servers, and...
how privacy, security, and ethics in computer system changed your life?
how privacy, security, and ethics in computer system changed your life?
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading...
You are a Network and security engineer for the XYZ Consulting Corporation, which is a leading network designer and security provider for the small-scale offices. As the Network and security engineer you are required to perform the following tasks. Task 1: Propose a network design for small scale office (Ex: Business type, departments, building plan). You are free to assume the name of the office and number of staffs ➢ Purpose of the Project ➢ Network overview (ex: connecting PCs,...
A company wants to purchase a new network file server for its wide-area computer network. The...
A company wants to purchase a new network file server for its wide-area computer network. The server costs $75,000, and will be completely obsolete in three years and worthless. If the company purchases the server, it can borrow the money at 10% and the server will be depreciated straight line to zero over three years, If the company leases the equipment they will make payments of $27,000 per year, payable at the end of each of the next three years....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT