IT Laws for Internet content monitoring

Posted on 2006-11-01
Medium Priority
Last Modified: 2013-12-04
Does anyone know a site that lays out U.S. Federal laws for IT Admins?  I am looking for what my responsibilities are if I suspect someone is doing something illegal over my network.
Question by:millers55
LVL 38

Accepted Solution

Rich Rumble earned 1000 total points
ID: 17849656
Local laws apply as well as employer company policies , and local laws of the victim. When the offense is from out of your country it's a bit harder to enforce or get cooperation from those gov'ts. You should inquire with HR about the proper procedure, if it's HR that is suspect you need to go higher VP, CTO, CIO, CFO. HR or whomever should contact local law enforcement if this breaks local or federal laws. If you don't have company policies have a look here: http://www.sans.org/resources/policies/
LVL 12

Assisted Solution

Phil_Agcaoili earned 1000 total points
ID: 18685550
I'll be as direct as possible answering your quite open (surprisingly) question--"I am looking for what my responsibilities are if I suspect someone is doing something illegal over my network."

It depends on the "illegal" activity that you believe that is going on...

For example:
- Child pornography has specific laws both in the real world and in the digital world.
- Selling perscription drugs in the physical world without a perscription is illegal, while selling them online internationally is not illegal.
- Buying and selling counterfeit merchandise in the physical world is illegal, while the same activity on the online world is not illegal.

What activity is going on and in what country and state are you in?

To cover the broad-range of questionable and possibly illegal activity and cover a company for liability's sake, most companies employ an Acceptable Use Policy (AUP) to alert users that corporate networks are monitored and define what acceptable behavior is on the network. For example:

Here's an example AUP from a Webhosting company that is trying to protect itself from "bad" customers who perform illegal activities on their websites: http://www.ait.com/acceptableusepolicy.php
So what this AUP states is that the hosting company can kill any website that they deem is illegal...notice no definition of what "illegal" means on the AUP.  At any time, a charge can be raised by ANYONE against any website hosted by this company and they have the right to shutdown the site.  


There is no ONE government Website on illegal Internet activity.

If you give us an idea of what the activity is and your location, we can better answer your question, but to be honest if you establish good policies, your legal team (you not have one) can easily defend any actions that you make on YOUR network that you do not agree with, including monitoring people for unacceptable use of your network.

Hope this helped.

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Planning to migrate your EDB file(s) to a new or an existing Outlook PST file? This video will guide you how to convert EDB file(s) to PST. Besides this, it also describes, how one can easily search any item(s) from multiple folders or mailboxes…
If you are looking for an automated tool which can generate reports for Outlook emails and other items from PST file, then you can go for Kernel PST Reporter tool. The reports which are created by this tool are helpful to analyze and understand PST …

600 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question