OSI Analysis/ OSI Annotation

  

A

Read through the Case Project 2-3 located on page 74 of the text. Answer the following questions in a 500-1000 word paper.

  1. Describe      how OSI model layers can affect a network’s design and networking in      general. 
  2. There      are two different types of switching technologies available in today’s      market. One lives on one layer while the other resides in a different      layer of the OSI model. Locate these switching technologies, describe the      differences in functionality, and relate those differences to the      functions inherent within the OSI model. Your OSI model annotation      document from week 1 will be valuable.
  3. How      can the OSI model be useful during troubleshooting processes?

B

  1. In      the center of the diagram, beneath each label place a 1 or 2-word      descriptor for that layer.
  2. Create      a list of at least 10 networking devices. Add those devices to their      proper layer on the left side of the diagram.
  3. Create      a list of at least 40 protocols. For each protocol, determine its port      number. Add each protocol to the appropriate layer on the right side of      the diagram.

Note: Some protocols span multiple layers. Indicate these protocols by adding +/- to the annotation.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DTGOV’s Leasing Agreement Case Study

  Respond to the questions below in a (3) “full” pages Word document.  

 

Answer the following questions in a substantive manner:   

  1. Why are the SLA monitors important? What are the two monitors that DTGOV is using? 
  2. What are their roles? How important is it to ensure that these monitors and their logs are protected against manipulation? 
  3. What are some ways to ensure that they are protected from manipulation?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Wk 3 Individual: System Requirements

Assignment Content

  1. As you learned in Week 2, requirements are a fundamental component to any project. Depending on the SDLC applied, requirements can be written in different forms. For example, some requirements will be very technically focused (technical requirements) and are written in a manner that dictates what a stakeholder expects the system to accomplish. Another approach taken, often with Agile-run projects, is to create a user story. A user story focuses on different types of system users and outlines more of a workflow that organizations expect.

    Review the Wk 2 Discussion 1 about what makes well-written requirements.

    The WeLoveVideo, Inc. project team met with the business owners last week in a structured requirements-gathering meeting. In this meeting, they discussed that the requirements should focus on certain users, such as customer support representatives and inside-sales representatives, as well as be geared towards the system supporting the job function.

    Create 15 to 20 system requirements based on the scope of the project discussed in the requirements meeting. Ensure the requirements meet quality standards and are outlined in priority order. Provide a justification behind the prioritization within the document. You may use any Microsoft® program, such as Excel® or Word, to create the list of requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion – 1 (Telecom Network Security ISOL – 532)

 How can organizational management measure the success of their network security? Please provide an example 

 (see pages 10-11) 

2 Pages 

No Plagrism

Minimum 5 citations

 

  • Use  only academic sources– these are sources that are published  in academic journals (e.g. journal of business management, journal of  international business, journal of technology etc.) 
  • When citing a source in your paragraphs it should be done in this manner:  Stewart (2017) noted, stated, explained…. and use sources that are published after 2013.
  •  Use the attached DQ template for all your post 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SIMPLE ALU

Prompt

In this project, you will design and build a simple CPU on Logisim and write programs that can run on it. If you haven’t yet, you can download Logisim by following this link: http://www.cburch.com/logisim/download.html

Your design will go through four phases. In the first phase, you will design and build the ALU using Logisim. In the second phase, you will design the instruction set that implements the instructions you designed in phase one. In the third phase, you will design and implement a control unit for this ALU using Logisim. By connecting the CU to the ALU, you will get a functional CPU. In phase four of the project, you will write assembly language programs for the CPU you built.

Phase One

Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:

· Arithmetic addition

· Increment

· Decrement

· Comparison (with 3 outputs: one for equals, one for less than and one for greater than)

· Logic bitwise Not

· Logic bitwise And

· Logic bitwise Or

· Register right logic shift

· Register left logic shift

In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’

After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Phase Two

In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:

· Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.

· Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.

· In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.

Please record your answer to phase two in the same Word doc and label it ‘Phase Two.’

Phase Three

In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:

· addition

· logic bitwise AND

· right logic shift

In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.

Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’

Phase Four

In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):

· branch to an address (name it JMP)

· conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)

Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:

· Write a program that adds two operands.

· Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.

· Write a program that increments by 2 the content of a register 10 times.

· Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.

· Please record your programs in the same Word doc and label them under the section ‘Phase Four.’

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Inventory_Iterator

  

You will be working with iterators directly or indirectly (depending on how much abstraction you choose).

The program reads data from two files, itemsList-0x.txt and inventoryList-0x.txt. File extensions on Linux may be arbitrary–i.e., these files could have been named with .dat as the extensions.

One of the most important skills in our craft is interpreting error messages. Remember the ones you receive when you attempt to compile the unmodified code.

The key abstractions employed in this program are Item, ItemStack, and Inventory. Complete ADT implementations have been provided for the former two. A partial implementation has been provided for the Inventory. Your task is to finish the Inventory.

You must implement:

  1. Copy Constructor
  2. Assignment Operator
    • Note       this is already provided and complete. Refer to our discussions of the       copy-and-swap method.
    • Once       you have completed the Copy Constructor, you are done with the Big-3.
  3. Inventory::isFull –      refer to documentation in Inventory.h.
  4. Inventory::findMatchingItemStackIterator – refer to documentation in Inventory.h.
  5. Inventory::addItemStackNoCheck – refer to documentation in Inventory.h.
  6. Inventory::mergeStacks –      refer to documentation in ItemStack.h.
  7. Inventory::display.      This must generate the Inventory summary

=========================================

You can implement the Copy Constructor, findMatchingItemStack, and display with loops.

You can, alternatively, use the built-in C++ functions discussed in Review 03 Example 5 (if you like a challenge).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 4 Journal

how Excel can be used in each of the following areas of daily life?

  • home (e.g., saving money, budgeting, tracking expenses, keeping up with maintenance or projects);
  • work (e.g., creating graphs or charts for presentations); and
  • school (e.g., tracking classes, time management).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

itmg 281

 question 1

  1. The trial court found that Stengart did not have a legitimate expectation of privacy when sending personal emails through the company’s laptop. The appellate court and the Supreme Court disagreed. Discuss the reasoning that the higher courts had in reversing the trial court.
  2. What effect would this decision have on a company when thinking about forming company policy regarding personal communication?
  3. What kind of tools/techniques are available for Internet surfing process to comply with COPPA?

STENGART v. LOVING CARE AGENCY: 201 N.J. 300, 990 A.2d 650 (2010)

FACTS

[Marina Stengart worked for Loving Care Agency, Inc. (Loving Care), a home healthcare agency, as an Executive Director of Nursing. The company provided her with a laptop computer from which she could access her own personal email as well as the company’s server to access company emails.]

[At the end of 2007, Stengart accessed her own personal Yahoo email account on the company’s laptop to speak with her attorney concerning her situation at work. She did not save her email user ID or password on the company laptop and did not save any private information on the computer. The company’s browser software, however, automatically saved a copy of each web page visited in a temporary cache folder. She was not aware of this.]

[Soon after, Stengart left Loving Care and returned the laptop computer. A few months later, she filed a lawsuit with claims of discrimination, harassment, and retaliation. After the lawsuit was filed, Loving Care hired a company to retrieve all files from the laptop’s hard drive. The files that were retrieved included email communications that Stengart had with her attorney through her personal email account.]

[Loving Care’s attorneys used the email communications in the lawsuit. Stengart’s attorneys argued that the email communications were private. Loving Care’s attorneys countered that there was no reasonable expectation of privacy based on the company’s policy, which stated:]

Loving Care may review, access, and disclose all matters on the company’s media systems and services at any time e-mails, Internet communications and computer files are the company’s business records and are not to be considered private or personal to any individual employee occasional personal use of the computer is permitted.

[Stengart’s attorneys requested that the judge disqualify Loving Care’s attorneys and exclude the emails from evidence. The judge denied the request, holding that Stengart waived the attorney-client privilege. Stengart appealed the denial of the request. The appellate court reversed and remanded the decision to the trial court. Loving Care appealed.]

JUDICIAL OPINION (JUDGE RABNER)

Loving Care argues that its employees have no expectation of privacy in their use of company computers based on the company’s Policy. In its briefs before this Court, the company also asserts that by accessing e-mails on a personal account through Loving Care’s computer and server, Stengart either prevented any attorney-client privilege from attaching or waived the privilege by voluntarily subjecting her e-mails to company scrutiny. Finally, Loving Care maintains that its counsel did not violate RPC 4.4(b) because the e-mails were left behind on Stengart’s company computer—not “inadvertently sent,” as per the Rule—and the Firm acted in the good faith belief that any privilege had been waived.

Stengart argues that she intended the e-mails with her lawyer to be confidential and that the Policy, even if it applied to her, failed to provide adequate warning that Loving Care would save on a hard drive, or monitor the contents of, e-mails sent from a personal account. Stengart also maintains that the communications with her lawyer were privileged. When the Firm encountered the arguably protected e-mails, Stengart contends it should have immediately returned them or sought judicial review as to whether the attorney-client privilege applied.

A

We start by examining the meaning and scope of the Policy itself. The Policy specifically reserves to Loving Care the right to review and access “all matters on the company’s media systems and services at any time.” In addition, e-mail messages are plainly “considered part of the company’s business … records.”

It is not clear from that language whether the use of personal, password-protected, web-based e-mail accounts via company equipment is covered. The Policy uses general language to refer to its “media systems and services” but does not define those terms. Elsewhere, the Policy prohibits certain uses of “the e-mail system,” which appears to be a reference to company e-mail accounts. The Policy does not address personal accounts at all. In other words, employees do not have express notice that messages sent or received on a personal, web-based e-mail account are subject to monitoring if company equipment is used to access the account.

The Policy also does not warn employees that the contents of such e-mails are stored on a hard drive and can be forensically retrieved and read by Loving Care.

The Policy goes on to declare that e-mails “are not to be considered private or personal to any individual employee.” In the very next point, the Policy acknowledges that “[o]ccasional personal use [of e-mail] is permitted.” As written, the Policy creates ambiguity about whether personal e-mail use is company or private property.

The scope of the written Policy, therefore, is not entirely clear.

B

The policies underlying the attorney-client privilege further animate this discussion. The venerable privilege is enshrined in history and practice…. Its primary rationale is to encourage “free and full disclosure of information from the client to the attorney.” That, in turn, benefits the public, which “is well served by sound legal counsel” based on full, candid, and confidential exchanges.

“For a communication to be privileged it must initially be expressed by an individual in his capacity as a client in conjunction with seeking or receiving legal advice from the attorney in his capacity as such, with the expectation that its content remain confidential.”

E-mail exchanges are covered by the privilege like any other form of communication.

The e-mail communications between Stengart and her lawyers contain a standard warning that their contents are personal and confidential and may constitute attorney-client communications. The subject matter of those messages appears to relate to Stengart’s working conditions and anticipated lawsuit against Loving Care.

IV

Under the particular circumstances presented, how should a court evaluate whether Stengart had a reasonable expectation of privacy in the e-mails she exchanged with her attorney?

A

Preliminarily, we note that the reasonable-expectation-of-privacy standard used by the parties derives from the common law and the Search and Seizure Clauses of both the Fourth Amendment and Article I, paragraph 7 of the New Jersey Constitution. The latter sources do not apply in this case, which involves conduct by private parties only.

The common law source is the tort of “intrusion on seclusion,” which … provides that “[o]ne who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.” A high threshold must be cleared to assert a cause of action based on that tort. A plaintiff must establish that the intrusion “would be highly offensive to the ordinary reasonable man, as the result of conduct to which the reasonable man would strongly object.”

As is true in Fourth Amendment cases, the reasonableness of a claim for intrusion on seclusion has both a subjective and objective component.

B

A number of courts have tested an employee’s claim of privacy in files stored on company computers by evaluating the reasonableness of the employee’s expectation. No reported decisions in New Jersey offer direct guidance for the facts of this case. In one matter, the Appellate Division found that the defendant had no reasonable expectation of privacy in personal information he stored on a workplace computer under a separate password. The defendant had been advised that all computers were company property. His former employer consented to a search by the State Police, who, in turn, retrieved information tied to the theft of company funds. The court reviewed the search in the context of the Fourth Amendment and found no basis for the defendant’s privacy claim in the contents of a company computer that he used to commit a crime.

Certain decisions from outside New Jersey, which the parties also rely on, are more instructive. Among them, National Economic Research Associates v. Evans, 21 Mass. L. Rptr. No. 15, at 337, 2006 WL 2440008 (Mass.Super.Ct. Aug. 3, 2006), is most analogous to the facts here. In Evans, an employee used a company laptop to send and receive attorney-client communications by e-mail. In doing so, he used his personal, password-protected Yahoo account and not the company’s e-mail address. The e-mails were automatically stored in a temporary Internet file on the computer’s hard drive and were later retrieved by a computer forensic expert. The expert recovered various attorney-client e-mails; at the instruction of the company’s lawyer, those e-mails were not reviewed pending guidance from the court.

A company manual governed the laptop’s use. The manual permitted personal use of e-mail, to “be kept to a minimum,” but warned that computer resources were the “property of the Company” and that e-mails were “not confidential” and could be read “during routine checks.”

The court denied the company’s application to allow disclosure of the e-mails that its expert possessed. The court reasoned,

Based on the warnings furnished in the Manual, Evans [could not reasonably expect to communicate in confidence with his private attorney if Evans e-mailed his attorney using his [company] e-mail address through the NERA Intranet, because the Manual plainly warned Evans that e-mails on the network could be read by NERA network administrators. The Manual, however, did not expressly declare that it would monitor the content of Internet communications…. Most importantly, the Manual did not expressly declare, or even implicitly suggest, that NERA would monitor the content of e-mail communications made from an employee’s personal e-mail account via the Internet whenever those communications were viewed on a NERA-issued computer. Nor did NERA warn its employees that the content of such Internet e-mail communications is stored on the hard disk of a NERA-issued computer and therefore capable of being read by NERA.

As a result, the court found the employee’s expectation of privacy in e-mails with his attorney to be reasonable.

According to some courts, employees appear to have a lesser expectation of privacy when they communicate with an attorney using a company e-mail system as compared to a personal, web-based account like the one used here…. As a result, courts might treat e-mails transmitted via an employer’s e-mail account differently than they would web-based e-mails sent on the same company computer.

Courts have also found that the existence of a clear company policy banning personal e-mails can also diminish the reasonableness of an employee’s claim to privacy in e-mail messages with his or her attorney…. We recognize that a zero-tolerance policy can be unworkable and unwelcome in today’s dynamic and mobile workforce and do not seek to encourage that approach in any way.

 

JAYNES V. COMMONWEALTH OF VIRGINIA: 666 S.E.2d 303 (Va. Sept. 12, 2008)

FACTS

[From his home in Raleigh, North Carolina, Jaynes used several computers, routers and servers to send over 10,000 emails within a 24-hour period to subscribers of America Online, Inc. (AOL) on each of three separate occasions. On July 16, 2003, Jaynes sent 12,197 pieces of unsolicited e-mail with falsified routing and transmission information onto AOL’s proprietary network. On July 19, 2003, he sent 24,172, and on July 26,2003, he sent 19,104. None of the recipients of the emails had requested any communication from Jaynes. He intentionally falsified the header information and sender domain names before transmitting the emails to the recipients. However, investigators used a sophisticated database search to identify Jaynes as the sender of the emails.43]

[The Circuit Court of Loudon County, Virginia convicted Jeremy Jaynes of violating Va. Code § 18.2-152.3:1, which is the unsolicited bulk electronic mail provision of the Virginia Computer Crimes Act, Va. Code §§ 18.2-152.1 through -152.15, and sentenced him to three years in prison for each of three counts, for a total term of nine years. The Virginia Court of Appeals affirmed, and, in a 4–3 decision, the Supreme Court of Virginia also affirmed the conviction.44]

[However, the Virginia Supreme Court granted Jaynes’ petition for a rehearing. He argued on rehearing that he should have been allowed to challenge the constitutionality of § 18.2-152.3:1, that the statute violated his First Amendment rights, and that his conviction therefore should be overturned.]

Question 2

JUDICIAL OPINION (SUPREME COURT JUSTICE G. STEVEN AGEE)

Jaynes was arrested and charged with violating Code § 18.2-152.3:1, which provides in relevant part:

A. Any person who:

1. Uses a computer or computer network with the intent to falsify or forge electronic mail transmission information or other routing information in any manner in connection with the transmission of unsolicited bulk electronic mail through or into the computer network of an electronic mail service provider or its subscribers … is guilty of a Class 1 misdemeanor.

B. A person is guilty of a Class 6 felony if he commits a violation of subsection A and:

1. The volume of UBE transmitted exceeded 10,000 attempted recipients in any 24-hour period, 100,000 attempted recipients in any 30-day time period, or one million attempted recipients in any one-year time period ….45

… Reversing, the Supreme Court of Virginia held that the statute under which Jaynes was convicted, Virginia’s Anti-SPAM Act, was unconstitutionally overbroad.

3. CONSTITUTIONALITY OF CODE § 18.2-152.3:1

We now turn to Jaynes’ contention that Code § 18.2-152.3:1 is unconstitutionally overbroad. To address this challenge, we first review certain technical aspects of the transmission of e-mails. In transmitting and receiving e-mails, the e-mail servers use a protocol which prescribes what information one computer must send to another. This [Simple Mail Transfer Protocol (SMTP)] requires that the routing information contain an [Internet Provider (IP)] address and a domain name for the sender and recipient of each e-mail. Domain names and IP addresses are assigned to Internet servers by private organizations through a registration process. To obtain an IP address or domain name, the registrant pays a fee and provides identifying contact information to the registering organization. The domain names and IP addresses are contained in a searchable database which can associate the domain name with an IP address and vice versa.

The IP address and domain name do not directly identify the sender, but if the IP address or domain name is acquired from a registering organization, a database search of the address or domain name can eventually lead to the contact information on file with the registration organizations. A sender’s IP address or domain name which is not registered will not prevent the transmission of the e-mail; however, the identity of the sender may not be discoverable through a database search and use of registration contact information.

As shown by the record, because e-mail transmission protocol requires entry of an IP address and domain name for the sender, the only way such a speaker can publish an anonymous e-mail is to enter a false IP address or domain name. Therefore, like the registration record on file in the mayor’s office identifying persons who chose to canvass private neighborhoods in Watchtower Bible & Tract Society v. Village of Stratton, 536 U.S. 150 (2002), registered IP addresses and domain names discoverable through searchable data bases and registration documents “necessarily result[] in a surrender of [the speaker’s] anonymity.” 536 U.S. at 166. The right to engage in anonymous speech, particularly anonymous political or religious speech, is “an aspect of the freedom of speech protected by the First Amendment.” McIntyre v. Ohio Elections Comm’n, 514 U.S. 334, 342 (1995). By prohibiting false routing information in the dissemination of e-mails, Code § 18.2-152.3:1 infringes on that protected right. The Supreme Court has characterized regulations prohibiting such anonymous speech as “a direct regulation of the content of speech.” Id. at 345.

State statutes that burden “core political speech,” as this statute does, are presumptively invalid and subject to a strict scrutiny test. Under that test a statute will be deemed constitutional only if it is narrowly drawn to further a compelling state interest. Id. at 347. In applying this test, we must also consider that state statutes are presumed constitutional, City Council v. Newsome, 226 Va. 518, 523, 311 S.E.2d 761, 764 (1984), and any reasonable doubt regarding constitutionality must be resolved in favor of validity. In re Phillips, 265 Va. 81, 85–86, 574 S.E.2d 270, 272 (2003).

There is no dispute that Code § 18.2-152.3:1 was enacted to control the transmission of unsolicited commercial bulk e-mail, generally referred to as SPAM. In enacting the federal CAN-SPAM Act, Congress stated that commercial bulk e-mail threatened the efficiency and convenience of e-mail. 15 U.S.C. § 7701(a)(2). Many other states have regulated unsolicited bulk e-mail but, unlike Virginia, have restricted such regulation to commercial e-mails. See e.g., Ariz. Rev. Stat. § 44-1372.01; Ark. Code Ann. § 4-88-603; Cal. Bus. & Prof. Code § 17538.45; Fla. Stat. § 668.603; Idaho Code § 48-603E; Ill. Comp. Stat., tit. 815 § 511/10; Ind. Code § 24-5-22-7; Kan. Stat. Ann. § 50-6, Md. Code Ann., Commercial Law § 14-3002. There is nothing in the record or arguments of the parties, however, suggesting that unsolicited non-commercial bulk e-mails were the target of this legislation, caused increased costs to the Internet service providers, or were otherwise a focus of the problem sought to be addressed by the General Assembly through its enactment of Code § 18.2-152.3:1.

Jaynes does not contest the Commonwealth’s interest in controlling unsolicited commercial bulk e-mail as well as fraudulent or otherwise illegal e-mail. Nevertheless, Code § 18.2-152.3:1 is not limited to instances of commercial or fraudulent transmission of e-mail, nor is it restricted to transmission of illegal or otherwise unprotected speech such as pornography or defamation speech. Therefore, viewed under the strict scrutiny standard, Code § 18.2-152.3:1 is not narrowly tailored to protect the compelling interests advanced by the Commonwealth.

4. SUBSTANTIAL OVERBREADTH

The Commonwealth argues that Code § 18.2-152.3:1 is not substantially overbroad because it does not impose any restrictions on the content of the e-mail and “most” applications of its provisions would be constitutional, citing its application to unsolicited bulk commercial e-mail, unsolicited bulk e-mail that proposes a criminal transaction, and unsolicited bulk e-mail that is defamatory or contains obscene images. According to the Commonwealth an “imagine[d] hypothetical situation where the Act might be unconstitutional as applied does not render the Act substantially overbroad.”

The United States Supreme Court recently reviewed the First Amendment overbreadth doctrine in United States v. Williams, 553 U.S.___, 128 S. Ct. 1830 (2008). The Court noted

[i]n order to maintain an appropriate balance, we have vigorously enforced the requirement that a statute’s overbreadth be substantial, not only in an absolute sense, but also relative to the statute’s plainly legitimate sweep.

… [I]t is impossible to determine whether a statute reaches too far without first knowing what the statute covers.

553 U.S. at ___, 128 S. Ct. at 1838. Applying that inquiry under Williams in this case is relatively straightforward as Code § 18.2-152.3:1 would prohibit all bulk e-mail containing anonymous political, religious, or other expressive speech. For example, were the Federalist Papers just being published today via e-mail, that transmission by Publius would violate the statute. Such an expansive scope of unconstitutional coverage is not what the Court in Williams referenced “as the tendency of our overbreadth doctrine to summon forth an endless stream of fanciful hypotheticals.” 553 U.S. at —, 128 S. Ct. at 1843. We thus reject the Commonwealth’s argument that Jaynes’ facial challenge to Code § 18.2-152.3:1 must fail because the statute is not “substantially overbroad.”46

III. CONCLUSION

For the foregoing reasons, we hold that the circuit court properly had jurisdiction over Jaynes. We also hold that Jaynes has standing to raise a First Amendment overbreadth claim as to Code § 18.2-152.3:1. That statute is unconstitutionally overbroad on its face because it prohibits the anonymous transmission of all unsolicited bulk e-mails including those containing political, religious or other speech protected by the First Amendment to the United States Constitution. Accordingly, we will reverse the judgment of the Court of Appeals and vacate Jaynes’ convictions of violations of Code § 18.2-152.3:1.47

CASE QUESTIONS

 

  1. Would a state anti spam statute that specifically prohibited pornographic, obscene, terroristic, and fraudulent emailing withstand constitutional scrutiny?  Why or why not?
  2. Is spam really so bad?  Why can a business lawfully send unsolicited traditional mail, or make unsolicited phone calls (as long as their is no violation of a no-call list) but spamming violates the law?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

281boo2

 

In order to complete assignment #7 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #7). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 121. HHS and the FTC recently launched an investigation into a major pharmacy chain for its information disposal practices. The regulators claimed that the pharmacy chain failed to protect customers’ sensitive financial and medical information by disposing prescriptions and labeled pill bottles in dumpsters that were accessible by the public. Based on the HIPAA (Health Insurance Portability and Accountability Act of 1996), what consequences should a company face for failing to properly dispose of customer information? For HIPAA act, you may check the website.Chapter 132. Trust is an important part of the continued growth and development of the Internet. This is particularly the case with respect to social networking. Media reports of disturbing stories and case law alike have shown some of the consequences that can arise when individuals create false social networking profiles. In a case in California, and individual established a fake MySpace profile of his former church pastor. On the profile, he posted content that suggested that the pastor used drugs and was homosexual. Can criminal charges be brought against the party that created the fake profile?

3. Read the Family Educational Rights and Privacy Act of 1974 (FERPA) at ED, discuss who has access to your educational record at APUS. Furthermore, what is the roles and responsibilities for APUS instructors and students to comply with FERPA

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

issc266wk7

 Quantum Cryptography is the future of cryptography. Quantum Cryptography is still being developed and as with every new technology, the Internet is booming with information about Quantum Cryptography. In this paper, you are going to synthesize what you think Quantum cryptography is and explain its applicability is next generation cryptographic algorithms and information privacy. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now