Premium Essay

Cybercrime Law

In:

Submitted By djkiss99
Words 5688
Pages 23
Cyber crimes essay
THE INFORMATION TECHNOLOGY ACT AMENDMENT OF 2008
Cyber law, in a general sense, has been envisaged as a term that encapsulates the legal issues related to the use of communicative, transactional, and distributive aspects of networked information devices and technologies. And the crimes against these issues are termed as cyber crime

Cyber law and cyber crime
Cyber crime spans not only state and national boundaries, but the international boundaries as well. At the Tenth United Nations Congress on the Prevention of Crime and Treatment of Offenders, in a workshop devoted to the issues of crimes related to computer networks, cybercrime was broken into two categories and defined thus: * In a narrow sense, the term cyber crime has been defined as any illegal behavior directed by means of electronic operations that target the security of computer systems and the data processed by them. * In the broader sense, cyber crime has been defined as any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network.
The extent of cyber crime is so vast and complicated that an act which may be crime in one nation may not be so in another. Some of the basic examples of cyber crime are unauthorized access, damage to computer data and program, computer sabotage, unauthorized interception of communications, computer espionage, etc. Thus, the fact is that there can be no exhaustive and complete definition of this term, as it is so wide that its arena increases every day. Once computer had been regarded as a boon for the human world, but today, there has been a change in the outlook.
To the utter disgrace, India had been ignorant of such a law as cyber law until the last decade. It was only when there was

Similar Documents

Premium Essay

Cybercrime Law Research Paper

...Cybercrime 27 & Agnew, 2006 ). People rationally choose to participate in criminal acts; in order to prevent these acts from occurring people need to know that consequences will outweigh the benefits. If people believe that the consequences outweigh the benefits t hen they will freely choose not to participate in the criminal behavior. On the other hand the positive school of criminology believes that individuals participate in crime because of forces beyond individual control and relies on the scientific method to prove it s theories (Cullen & Agnew, 2006 ). Individuals should not be held solely responsible for their actions because not everyone is rational. Outside factors can play an important part in determining one‟s participation in crime. Now that we have exami ned the two most dominant schools of criminological theory we can examine how two theories, self - control and routine activity, have been applied to the study of cybercrime and cybercrime victimization. Self - Control Theory One general crime theory that has been applied to the study of cybercrime is self - control theory. Self - control theory was first proposed by Travis Hirschi and Michael Gottfredson in their 1990 publication A General Theory of Crime . Self - control theory beli eves that criminal motivation is rampant, but that people act on this motivation only when they possess low self - control (Cullen & Agnew, 2006) . This...

Words: 904 - Pages: 4

Premium Essay

Cybercrime Law, Regulation, Effects on Innovation

...Cybercrime Law, Regulation, Effects on Innovation Human Aspects in Cybersecurity: Ethics, Legal Issues, and Psychology CSEC 620 9024 Summer Semester May 18, 2015 Table of Contents Introduction 1 The Role of the Government in Protecting National Security 1 Acceptance of Government Intervention on Protecting National Security 2 Reaction to the Security Intervention on the Private Sector 3 Impacts/Effects of Government Regulations to Private Industries 4 Compliance Measures to Protect National Security 5 Responsibility to Protect National Security 5 Conclusion 6 Introduction Government has the responsibility to protect its national security and citizen. This could be done by providing policies and procedural guidance to private industries. This relationship between government and private industry are not conflict immune as the balance between protecting the national interest and invading privacy is in question. Senior management from the private industry caught in between making the right decision to protect their customer or investing in cyber security. This research paper covers the impact of government regulations, security laws, and legal concepts on the private sector to protect national security and its interpretation and acceptance by the public. The Role of the Government in Protecting National Security The US government invested a lot to protect its critical infrastructure from cyberattack by creating and implementing policies...

Words: 1899 - Pages: 8

Free Essay

What Is Cyber Law?

...Philippines, consisting of lawmakers, bloggers and students, have sought a temporary restraining order (TRO) on the country's implementation of its Cybercrime Prevention Act of 2012--making it the sixth filed against the controversial legislation. According to GMA News Online on Monday, the petition centered on the definition of online libel stated in the law, specifically sections 4, 5 and 6, which the petitioners say are "unconstitutional due to vagueness". The law also curtails "constitutional rights to due process, speech, expression, free press and academic freedom", it stated. The Cybercrime Prevention Act of 2012 , signed by President Benigno Aquino III on Sep. 12, aims to fight online pornography, hacking, identity theft and spamming following local law enforcement agencies' complaints over the lack of legal tools to combat cybercrime. However, the law came with tougher legal penalties for Internet defamation, compared to traditional media. It also allows authorities to collect data from personal user accounts on social media and listen in on voice and video applications such as Skype, without a warrant. Users who post defamatory comments on Facebook or Twitter, for example, could be sentenced to up 12 years in jail. Hacktivists take aim The other five petitions filed with the Philippine Supreme Court, too, noted the law infringes on freedom of expression, due process, equal protection and privacy of communication, a separate report by GMA News Online on Saturday...

Words: 429 - Pages: 2

Free Essay

Global Crime Analysis Paper

...identify the various major global crimes and criminal issues that have a global impact on national and international justice systems and processes. In addition, the text will discuss the various international justice systems and how these global crimes and criminal issues are addressed. Fueled by open borders, global markets, and the advancement of telecommunications, international crime has become a rising universal problem. In 1995, President Clinton classified international crime as a danger to the national interest of the United States. Therefore, before and since then the federal government has been busy in a converging effort to address various major global crimes, such as human rights and war crimes, organized crime and narcotics, cybercrime, environmental crime, and terrorism (Global Solutions, n.d.). Human Rights and War Crimes are inhuman acts committed by an extensive or systematic attack aimed against individuals, such as genocide, crimes against humanity, slavery, torture, aggression, and war crimes. Organized crime is a profit-driven criminal organization or group who work together to commit illegal acts to achieve a common goal and most international organized crime involves narcotics violations including drug trafficking, drug manufacturing, and drug distribution are common trends in today's international and national organized...

Words: 1391 - Pages: 6

Premium Essay

Tft2 - Cyberlaw

...users and password requirements). Justify policies based on current federal information security laws/ regulations (i.e., HIPAA) 2. Task 2 - Policy Statements • For given scenario, develop three policy statements that would have prevented a security breach. Justify policies based on national or international standards (i.e., NIST, ISO) 3. Task 3 – Service Level Agreement • • • For given scenario, recommend/justify changes to service level agreement. Address the protection of the parent company’s physical property rights, intellectual property rights and the non-exclusivity clause Use Microsoft Word tracking to track your additions, deletions, and modifications. Insert your justifications after each SLA section, or write an essay describing your changes and justifications 4. Task 4 – Cybercrime • For the given scenario, write an essay responding to the following question prompts (suggested length of 3–5 pages): • • • • • • • • Discuss how two laws or regulations apply to the case study. Discuss how VL Bank will work within the parameters of appropriate legal jurisdiction with specific bodies of law enforcement to resolve the situation. Discuss legal considerations for preparing the digital evidence VL Bank will need to provide law enforcement and attorneys. Explain what coordination should take place between the CISO and VL Bank’s lawyer. Discuss how this cybercrime could affect VL Bank’s enterprise continuity. Explain how VL Bank could use technology...

Words: 369 - Pages: 2

Free Essay

Cyber Crime in Bangladesh

...Research Proposal on RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer  and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way...

Words: 1924 - Pages: 8

Free Essay

Rule of Law Paper

...Rule of Law Paper Currently computer use has become a day-to-day activity for students, professionals, universities, teachers, bankers, in entertainment, in medical business, and in organizations. As any other mechanism, the computer has two ways of operation. One use is good and essential, while the other is bad and unnecessary. Whenever a new machine is invented, many people use it for the wrong purpose unintentionally and so to make them conscious of their wrong use and to make them use the machine for its appropriate uses, laws are formulated and implemented. For the computer, cyber law was implemented to regulate cybercrime and inform people on the different types of computer uses that are viewed as legal and as crimes. One of the most commonly violated cyber law is the United States anti- cyber-stalking law, which is found at section 223 of the United States constitution stipulated for the cyberstalking crime. The anti-cyber-stalking law according to Hitchcock (2006) defines a cyber stalker as a person who intentionally, cruelly, and continuously harasses another person through the internet with the intention to make the person fear for his or her safety or the safety of other people who are closely connected to the victim. Additionally, a cyberstalker maybe an online stranger or a person known to the victim and may involve other people online who are not in any way connected to the victim. Lawfully, cyberstalking is considered as a criminal offense that is moderated through...

Words: 681 - Pages: 3

Premium Essay

Ethical Issues Arising from the Intersection of Law, Compliance & Investigations

...There are several ethical issues that arise in information security. The security is one of most issue of concern for every business organization. Ethics is a term which is used to distinguish between right or wrong things. Ethical issues in computer security includes cybercrimes, computer hacking and information warfare. In an Internet world, many banking organizations are attacked by attackers and millions of credit card details stolen every day. Cybercrimes such as credit card fraud cases, accessing someone’s account, stealing user credentials from social networking sites and sharing copyright information illegally. There are several Information Technology laws such as intellectual property laws, privacy laws and computer crime laws. The law that is enforced for employee workplace communication environment is under fact sheet 7, 2012, Privacy Rights Clearinghouse. Computer Security Act of 1987 (PL 100-235) and Computer Matching and Privacy Act which deals with securing of personal information that are stored in federal computer systems. This law is responsible for planning of security standards for protecting data against theft. Resolving Ethical issues It is the responsibility of security professionals to follow ethical codes and conducts for providing maximum security to an organization. These security professionals assure safety and reliability. In order to resolve these ethical issues a proper security plan has to be made and implemented in which every member of organization...

Words: 417 - Pages: 2

Free Essay

Information Tech

...In the mid 90’s the Internet changed everything, even the law. It has changed how legal research is done Population all over the world can work together now, despite living far in states or even countries. Before the Internet, we use to do research in different ways by going to the library using books and encyclopedias. Now a day you can use the Internet for anything you want, from researching an article, buying clothes, food, music and movies, and is the reason there is Internet law that is created to protect customers, brands and companies. An Internet law is the Communications Decency Act (CDA) in 1996, correcting the information in the websites. The purpose of this was to keep children and minors away from pornography. It is required that more laws concerning the Internet will be created and pass in order to protect consumers, buyers, marketers and businesses from the negative effects of misconducts or cybercrimes. Congress has to modernize almost daily with technological changes. Communication technology and new information available today are challenging the intellectual property system in ways that may be resolved with substantial changes, in a system or with new mechanisms to allocate both rights and remedies. Technological change is now leaving behind the legal structure that governs the system and is creating pressure to Congress to adjust the law to accommodate these changes. Some of the concerns are: Authors, publishers, filmmakers, and producers; representatives...

Words: 403 - Pages: 2

Premium Essay

Security And Privacy Controversy Online

...cannot be mutually exclusive. As we continue to advance with information and communication technologies, our society will require cyberlaws and the government needs to equip law enforcement with modernized tools to protect society’s most vulnerable in cyberspace. To achieve a happy medium between security and privacy, I propose the concepts of transparency, accountability, integrity, and professionalism in the security-privacy debate.  Today, there are over three billion online users, which make up about 40% of the world population (ITU 2014). The users are online, conducting daily communications, transactions, and sharing of information. The Internet has created an increasing amount of personal...

Words: 1892 - Pages: 8

Premium Essay

Cyberbullying

...Jessie Snyder Prof. Ervin ENG/280 02/06/2016 Cyberbullying Introduction Here I will open with some statistics on cyberbullying and the number of cases that are reported per year. Also, why we need newer and stricter laws implemented against bullying crimes. I. Cyberbullying Definition, History, and Demographics a) Definition of cyberbullying and What other cybercrimes qualify under the category of cyberbullying such as cyber harassment b) History, when did cyberbullying begin c) What are some demographics such as gender, race, sexuality, etc… II. Statistics a) Statistics on how common cyberbullying is b) And the number of new cases each day to show the prevalence of the situation. c) Number of suicide cases related to cyberbullying each year. d) Show the reason we need harsher punishments to stop cyberbullying. III. Effects of cyberbullying a) Show how cyberbullying affects the nation as a whole. b) Show the effects that cyberbullying has on the victims. c) Will touch on a couple of cases from cyberbullying and the affect it had on the victim. IV. Laws on Cyberbullying a) I will show current law on cyberbullying and whether they are federal and/or state b) What new laws need to be implemented and why. c) How the age of the bully affect the punishment’ V. Internet security a) Why internet safety is need in this day and age b) New programs that are designed to stop cyberbullying...

Words: 556 - Pages: 3

Free Essay

Plagiarism on the Context of Philippine Judicial and Legal System

...information, In situations where an individual plagiarized, the contents are subjected to changes, as he claims it to be his own, depriving the original author which it can affect its reliability. . The Department of Justice (DOJ) stated under its Advisory Opinion No. 02, Series of 2012 in addressing the meaning of plagiarism in the context of Philippine law and cases that "Plagiarism is a concept more understood in academic circles as an offense against academic integrity anathema to the strict standards of originality of scholarly works which members of the academic community subscribe to” Secretary of Justice Leila de Lima, likewise, stated that it is important to know what plagiarism is and to clarify the misconception that there is no crime of plagiarism under our laws. The Supreme Court described plagiarism as “ the deliberate and knowing presentation of another’s original ideas or creative expression as one’s own”. Thus, if committed under such circumstances can amount to an infringement on the rights of the original author and a criminal violation of the Intellectual Property Code, the E-Commerce Act or the Cybercrime Prevention Act. Plagiarism, is indeed, a crime under the Philippine Judicial and Legal System. In the case of U.S. Bloggers versus Sotto , where Sotto...

Words: 456 - Pages: 2

Premium Essay

Cyber Hacking Laws In The United States

...Assignment 1: Contrast and compare the cyber hacking laws between the United States, Russian Federation, and the Peoples Republic of China Though, the fact that cyber security hacking is a widely used term, the law, punishment, rules and law are not fully developed yet. First, the cyber hacking laws in three countries are going to be reviewed. The cyber hacking laws of US is also known as “Computer Fraud and Abuse Act (CFAA) ” was released by the congress in 1986. In the documentation, it provides the laws to protect personal intellectual property on computer. Basically, it says that people should get punishment by accessing an authorized computer. Here, accessing means stealing code, command, and documents; damaging information from a...

Words: 1530 - Pages: 7

Free Essay

Ethics

...stored on a card can be counterfeited. Of course, we don't need Willie Sutton to remind us that banks are where they keep the money. In 1994, a Russian hacker Vladimir Levin, operating from St Petersburg, accessed the computers of Citibank's central wire transfer department, and transferred funds from large corporate accounts to other accounts which had been opened by his accomplices in The United States, the Netherlands, Finland, Germany, and Israel. Officials from one of the corporate victims, located in Argentina, notified the bank, and the suspect accounts, located in San Francisco, were frozen. The accomplice was arrested. Another accomplice was caught attempting to withdraw funds from an account in Rotterdam. Although Russian law precluded Levin's extradition, he was arrested during a visit to the United States and subsequently imprisoned. (Denning 1999, 55). The above forms of computer-related crime are not necessarily mutually exclusive, and need not occur in isolation. Just as an armed robber might steal an automobile to facilitate a quick getaway, so too can one steal telecommunications services and use them for purposes of vandalism, fraud, or in furtherance of a criminal conspiracy.1 Computer-related crime may be compound in nature, combining two or more of the generic forms outlined above. The various activities of Kevin Mitnick, as described in Hafner and Markoff (1991) are illustrative. Problem areas • Telecommunications • Electronic...

Words: 2042 - Pages: 9

Premium Essay

Online Shopping – the Challenges View from Law & Ethic

...TABLE OF CONTENT TABLE OF CONTENT 2 ABSTRACT 4 CHAPTER 1 5 INTRODUCTION 5 1.1 Online Shopping 5 1.2 Security Issues 6 1.3 Computer Crimes Act 1997 7 1.4 Penal Code - Cheating 7 1.5 Electronic-Commerce Act 2006 8 1.6 Consumer Protection Act 1999 8 1.7 Tribunal for Consumer Claim (TCCM) 10 CHAPTER 2 11 FRAUD AND DECEPTION 11 CASES REPORTED 11 2.1 Statistic by PDRM 13 2.2 Statistic by KPDNKK 13 CHAPTER 3 14 RELATION WITH LAW AND ETHICS 14 3.1 Law Related Issues 14 3.5 Ethical and Morality Issues 16 CHAPTER 4 17 RECOMMMENDATION 17 4.1 Consumers Awareness 17 4.2 Enforcement Agency 18 CHAPTER 5 19 CONCLUSION 19 REFERENCES 20 STATUTE 20 ABSTRACT The development of the Internet and the globalization of market have brought changes in business and marketing throughout the world including Malaysia. The increase in world trade due to globalizations has received immense criticisms from society for its detrimental impact on the environment and causing social as well as trade injustices. These issues have led to the emergence of ethical consumers, who challenge business practices by demanding a more ethical conduct in the marketplace. The current legal framework is inadequate to serve as efficient and effective tools of control in protecting consumers against illegal and harmful online business despite the existence of several legislation, guidelines and codes of practice regulating online shopping. The government should think of ways and means of appropriate...

Words: 4007 - Pages: 17