Online commerce and information protection |
Federal Trade Commission Act (FTCA) |
1914 |
Recently used to challenge organizations with deceptive claims regarding the privacy and security of customers’ personal information |
Telecommunications |
Communications Act (47 USC 151 et seq.) |
1934 |
Includes amendments found in the Telecommunications Deregulation and Competition Act of 1996; this law regulates interstate and foreign telecommunications (amended 1996 and 2001) |
Freedom of information |
Freedom of Information Act (FOIA) |
1966 |
Allows for the disclosure of previously unreleased information and documents controlled by the U.S. government |
Protection of credit information |
Fair Credit Reporting Act (FCRA) |
1970 |
Regulates the collection and use of consumer credit information |
Privacy |
Federal Privacy Act |
1974 |
Governs federal agency use of personal information |
Privacy of student information |
Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. 1232g; 34 CFR Part 99) |
1974 |
Also known as the Buckley Amendment; protects the privacy of student education records |
Copyright |
Copyright Act (update to U.S. Copyright Law (17 USC)) |
1976 |
Protects intellectual property, including publications and software |
Cryptography |
Electronic Communications Privacy Act (update to 18 USC) |
1986 |
Regulates interception and disclosure of electronic information; also referred to as the Federal Wiretapping Act |
Access to stored communications |
Unlawful Access to Stored Communications (18 USC 2701) |
1986 |
Provides penalties for illegally accessing communications (such as e-mail and voicemail) stored by a service provider |
Threats to computers |
Computer Fraud and Abuse (CFA) Act (also known as Fraud and Related Activity in Connection with Computers) (18 USC 1030) |
1986 |
Defines and formalizes laws to counter threats from computer-related acts and offenses (amended 1996, 2001, and 2006) |
Federal agency information security |
Computer Security Act (CSA) |
1987 |
Requires all federal computer systems that contain classified information to have security plans in place, and requires periodic security training for all individuals who operate, design, or manage such systems |
Trap and trace restrictions |
General prohibition on pen register and trap-and-trace device use; exception (18 USC 3121 et seq.) |
1993 |
Prohibits the use of electronic “pen registers” and trap-and-trace devices without a court order |
Criminal intent |
National Information Infrastructure Protection Act (update to 18 USC 1030) |
1996 |
Categorizes crimes based on defendant’s authority to access a protected computer system and criminal intent |
Trade secrets |
Economic Espionage Act |
1996 |
Prevents abuse of information gained while employed elsewhere |
Personal health information protection |
Health Insurance Portability and Accountability Act (HIPAA) |
1996 |
Requires medical practices to ensure the privacy of personal medical information |
Encryption and digital signatures |
Security and Freedom Through Encryption Act |
1997 |
Affirms the rights of persons in the United States to use and sell products that include encryption and to relax export controls on such products |
IP |
No Electronic Theft Act amends 17 USC 506(a)—copyright infringement, and 18 USC 2319—criminal infringement of copyright (Public Law 105-147) |
1997 |
These parts of the U.S. Code amend copyright and criminal statutes to provide greater copyright protection and penalties for electronic copyright infringement |
Copy protection |
Digital Millennium Copyright Act (DMCA) (update to 17 USC 101) |
1998 |
Provides specific penalties for removing copyright protection from media |
Identity theft |
Identity Theft and Assumption Deterrence Act (18 USC 1028) |
1998 |
Attempts to instigate specific penalties for identity theft by identifying the individual who loses their identity as the true victim, not just those commercial and financial credit entities who suffered losses |
Child privacy protection |
Children’s Online Privacy Protection Act (COPPA) |
1998 |
Provides requirements for online service and Web site providers to ensure the privacy of children under 13 is protected |
Banking |
Gramm-Leach-Bliley (GLB) Act (also known as the Financial Services Modernization Act) |
1999 |
Repeals the restrictions on banks affiliating with insurance and securities firms; has significant impact on the privacy of personal information used by these industries |
Accountability |
Sarbanes-Oxley (SOX) Act (also known as the Public Company Accounting Reform and Investor Protection Act) |
2002 |
Enforces accountability for executives at publicly traded companies; is having ripple effects throughout the accounting, IT, and related units of many organizations |
General InfoSec |
Federal Information Security Management Act, or FISMA (44 USC 3541, et seq.) |
2002 |
Requires each federal agency to develop, document, and implement an agency-wide program to provide InfoSec for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source |
Spam |
Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act (15 USC 7701 et seq.) |
2003 |
Sets the first national standards for regulating the distribution of commercial e-mail, including mobile phone spam |
Fraud with access devices |
Fraud and Related Activity in Connection with Access Devices (18 USC 1029) |
2004 |
Defines and formalizes law to counter threats from counterfeit access devices like ID cards, credit cards, telecom equipment, mobile or electronic serial numbers, and the equipment that creates them |
Terrorism and extreme drug trafficking |
USA PATRIOT Improvement and Reauthorization Act (update to 18 USC 1030) |
2006 |
Renews critical sections of the USA PATRIOT Act |
Privacy of PHI |
American Recovery and Reinvestment Act |
2009 |
In the privacy and security area, requires new reporting requirements and penalties for breach of Protected Health Information (PHI) |
Privacy of PHI |
Health Information Technology for Economic and Clinical Health (HITECH) Act (part of ARRA-2009) |
2009 |
Addresses privacy and security concerns associated with the electronic transmission of PHI, in part, through several provisions that strengthen HIPAA rules for civil and criminal enforcement |
Defense information protection |
International Traffic in Arms Regulations (ITAR) Act |
2012 |
Restricts the exportation of technology and information related to defense and military-related services and materiel including research and development information |
National cyber infrastructure protection |
National Cybersecurity Protection Act |
2014 |
Updates the Homeland Security Act of 2002, which established the Department of Homeland Security, to include a national cybersecurity and communications integration center to share information and facilitate coordination between agencies, and perform analysis of cybersecurity incidents and risks |
Federal information security updates |
Federal Information Security Modernization Act |
2014 |
Updates many outdated federal information security practices, updating FISMA, providing a framework for ensuring effectiveness in information security controls over federal information systems, and centralizing cybersecurity management within DHS |
National information security employee assessment |
Cybersecurity Workforce Assessment Act |
2014 |
Tasks DHS to perform an evaluation of the national cybersecurity employee workforce at least every three years, and to develop a plan to improve recruiting and training of cybersecurity employees |
Terrorist tracking |
USA FREEDOM Act |
2015 |
Updates the Foreign Intelligence Surveillance Act (FISA); transfers the requirement to collect and report communications to/from known terrorist phone numbers to communications carriers, to be provided to select federal agencies upon request, among other updates to surveillance activities |