expand for answer

Prudent Man Rule

Invoked by the Federal Sentencing Guidelines, the rule that requires senior officials to perform their duties with the care that ordinary, prudent people would exercise under similar circumstances.


Similar items:
Layer 7 of the Open Systems Interconnection (OSI) model. The topmost layer in the OSI Reference Model, providing such communication service is invoked through a software package. This layer provides the interface between end users and networks. It
[view]
Predefined operations (manual or automatic) invoked when a fault or failure is detected in a system.
[view]
An independent category of service such as operating system services, communication services and data management services. Each primary service provides a discrete set of functionality. Each primary service inherently includes generic qualities such as usability, manageability and security. Security services are therefore not primary services but are invoked as part of the provision of primary services by the primary service provider.
[view]
The Counterfeit Access Device and Computer Fraud and Abuse Act of 1986 outlaws unauthorized access to the federal government’s computers and financial databases as protected under the Right to Financial Privacy Act of 1978 and the Fair Credit Reporting Act of 1971. This Act is an amendation of the 1984 Federal Computer Fraud Act.
[view]
Failure to exercise the degree of care considered reasonable under the circumstances, resulting in an unintended injury to another party. Failure to use such care as a reasonably prudent and careful person would use under similar circumstances; the doing of some act which a person of ordinary prudence would not have done under similar circumstances or failure to do what a person of ordinary prudence would have done under similar circumstances; conduct that falls below the norm for the protection of others against unreasonable risk of harm. It is characterized by inadvertence, thoughtlessness, inattention, recklessness, etc.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in