Solved

IT Laws for Internet content monitoring

Posted on 2006-11-01
4
272 Views
Last Modified: 2013-12-04
Does anyone know a site that lays out U.S. Federal laws for IT Admins?  I am looking for what my responsibilities are if I suspect someone is doing something illegal over my network.
0
Comment
Question by:millers55
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 17849656
Local laws apply as well as employer company policies , and local laws of the victim. When the offense is from out of your country it's a bit harder to enforce or get cooperation from those gov'ts. You should inquire with HR about the proper procedure, if it's HR that is suspect you need to go higher VP, CTO, CIO, CFO. HR or whomever should contact local law enforcement if this breaks local or federal laws. If you don't have company policies have a look here: http://www.sans.org/resources/policies/
-rich
0
 
LVL 12

Assisted Solution

by:Phil_Agcaoili
Phil_Agcaoili earned 250 total points
ID: 18685550
I'll be as direct as possible answering your quite open (surprisingly) question--"I am looking for what my responsibilities are if I suspect someone is doing something illegal over my network."

It depends on the "illegal" activity that you believe that is going on...

For example:
- Child pornography has specific laws both in the real world and in the digital world.
- Selling perscription drugs in the physical world without a perscription is illegal, while selling them online internationally is not illegal.
- Buying and selling counterfeit merchandise in the physical world is illegal, while the same activity on the online world is not illegal.

What activity is going on and in what country and state are you in?

To cover the broad-range of questionable and possibly illegal activity and cover a company for liability's sake, most companies employ an Acceptable Use Policy (AUP) to alert users that corporate networks are monitored and define what acceptable behavior is on the network. For example:
http://www.csoonline.com/read/090105/keystroke_3827.html
http://www.csoonline.com/fundamentals/abc_surveillance.html

Here's an example AUP from a Webhosting company that is trying to protect itself from "bad" customers who perform illegal activities on their websites: http://www.ait.com/acceptableusepolicy.php
So what this AUP states is that the hosting company can kill any website that they deem is illegal...notice no definition of what "illegal" means on the AUP.  At any time, a charge can be raised by ANYONE against any website hosted by this company and they have the right to shutdown the site.  

Follow?

There is no ONE government Website on illegal Internet activity.

If you give us an idea of what the activity is and your location, we can better answer your question, but to be honest if you establish good policies, your legal team (you not have one) can easily defend any actions that you make on YOUR network that you do not agree with, including monitoring people for unacceptable use of your network.

Hope this helped.
0

Featured Post

Why You Need a DevOps Toolchain

IT needs to deliver services with more agility and velocity. IT must roll out application features and innovations faster to keep up with customer demands, which is where a DevOps toolchain steps in. View the infographic to see why you need a DevOps toolchain.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question