Solved

IT Laws for Internet content monitoring

Posted on 2006-11-01
4
267 Views
Last Modified: 2013-12-04
Does anyone know a site that lays out U.S. Federal laws for IT Admins?  I am looking for what my responsibilities are if I suspect someone is doing something illegal over my network.
0
Comment
Question by:millers55
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 250 total points
ID: 17849656
Local laws apply as well as employer company policies , and local laws of the victim. When the offense is from out of your country it's a bit harder to enforce or get cooperation from those gov'ts. You should inquire with HR about the proper procedure, if it's HR that is suspect you need to go higher VP, CTO, CIO, CFO. HR or whomever should contact local law enforcement if this breaks local or federal laws. If you don't have company policies have a look here: http://www.sans.org/resources/policies/
-rich
0
 
LVL 12

Assisted Solution

by:Phil_Agcaoili
Phil_Agcaoili earned 250 total points
ID: 18685550
I'll be as direct as possible answering your quite open (surprisingly) question--"I am looking for what my responsibilities are if I suspect someone is doing something illegal over my network."

It depends on the "illegal" activity that you believe that is going on...

For example:
- Child pornography has specific laws both in the real world and in the digital world.
- Selling perscription drugs in the physical world without a perscription is illegal, while selling them online internationally is not illegal.
- Buying and selling counterfeit merchandise in the physical world is illegal, while the same activity on the online world is not illegal.

What activity is going on and in what country and state are you in?

To cover the broad-range of questionable and possibly illegal activity and cover a company for liability's sake, most companies employ an Acceptable Use Policy (AUP) to alert users that corporate networks are monitored and define what acceptable behavior is on the network. For example:
http://www.csoonline.com/read/090105/keystroke_3827.html
http://www.csoonline.com/fundamentals/abc_surveillance.html

Here's an example AUP from a Webhosting company that is trying to protect itself from "bad" customers who perform illegal activities on their websites: http://www.ait.com/acceptableusepolicy.php
So what this AUP states is that the hosting company can kill any website that they deem is illegal...notice no definition of what "illegal" means on the AUP.  At any time, a charge can be raised by ANYONE against any website hosted by this company and they have the right to shutdown the site.  

Follow?

There is no ONE government Website on illegal Internet activity.

If you give us an idea of what the activity is and your location, we can better answer your question, but to be honest if you establish good policies, your legal team (you not have one) can easily defend any actions that you make on YOUR network that you do not agree with, including monitoring people for unacceptable use of your network.

Hope this helped.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now