IT Laws and Policies

 

Stevens

State Laws

  • Computer Impersonation and Electronic Forgery Act
    The Computer Impersonation and Electronic Forgery Act was passed to protect one's computer identity from falsification and to protect people from electronic mail forgery and document forgery.
  • Uniform Electronic Transactions Act (UETA)
    The Uniform Electronic Transactions Act is a law passed by NJ and 46 other states. The UETA's purpose is to aline the various states laws on areas concerning electronic records, contracts, and, signatures and their validity in the courtroom.
  • NJ Chapter Laws P.L.2005, c.028 
    Prohibits the display of students social security numbers by institutions of high education for any purpose unless required by another law.
  • NJ Identity Theft Prevention Act
    The New Jersey Identity Theft Prevention Act mandates notification in the event of a security breach. The act also details your rights in obtaining a "security freeze" on your credit line if one feels their identity has been stolen.

Federal Laws

  • Family Educational Rights and Privacy Act (FERPA)
    The Family Education Rights and Privacy Act (FERPA) protects the privacy of student education records. Information on a student is viewable by their parents up until the age of 18 or before their college years. Information regarding a student's name, address, phone number, date and place of birth, even dates of atttendance are not protected under FERPA.
  • Health Insurance Portability and Accountability Act (HIPAA)
    The Health Insurance Portability and Accountability Act (HIPAA) outlines the methods by which health information may be collected, released and transfered.
  • Health Information Technology for Economic and Clinical Health Act (HITECH Act)
    The HITECH ACT, part of the American Recovery and Reinvestment Act, expands the scope of privacy and security originally laid out under HIPAA. It also requires that patients must be notified of any data breach of their personal health information.
  • Administrative Simplification Compliance Act (ASCA)
    The Administrative Simplication Compliance Act (ASCA) ammends HIPAA to ensure the establishment of uniform standards and requirements for electronic transmissions of health information minimalizing alterations by paper and other methods of communication.
  • Digital Millennium Copyright Act (DMCA)
    The Digital Millennium Copyright Act (DMCA) defines the illegality of removing or altering electronic rights management information along with the distribution or broadcasting of such data. The DMCA also states that a copyright owner can obtain a subpoena ordering a service provider to disclose the identity of any persons who infringe upon this law.
  • Higher Education Opportunity Act of 2008 - Digital Copyright Law Compliance 
    The Higher Education Opportunity Act (HEOA) of 2008, also referred to as H.R. 4137, primarily addresses obstacles that make it difficult for qualified students to obtain a college education, but it also includes specific statements requiring colleges and universities to comply with digital copyright laws.
  • United States Telecommunications Act 
    The United States Telecommunications Act dictates that in anticipation of or during times of war, public peril, disaster, or, national emergency that the government may close or take control of telecommunication stations and facilities.
  • Electronic Communications Privacy Act (ECPA)
    The Electronic Communications Privacy Act (ECPA) defines electronic communication as transfer of all data by means of wire, radio, electromagnetic, infrared, etc. The ECPA protects electronic communications while in transit and after they are stored.
  • Children's Online Privacy Protection Act (COPPA)
    The Children's Online Privacy Protection Act (COPPA) outlines the proper methods of obtaining, storing, and distributing personal infomation of children under the age of 13.
  • Fraud and related activity in connection with computers 
    This section of US law defines computer fraud as intentionally accessing a computer without authorization or by means of exceeding your allowed access to obtain or alter protected information.
  • Gramm-Leach-Bliley Act (GLBA)
    The Gramm-Leach-Bliley Act (GLBA) includes provisions to protect consumers personal financial information held by financial institutions. Under GLBA it is the obligation of the University to establish appropriate standards for areas under its jurisdiction relating to administrative, technical, and physical safeguards.