Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION...

Preview:

Citation preview

EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES

WE WILL EXAMINE THE LAWS RELATED TO CRIMES COMMITTED WHILE USING COMPUTERS AND DEVICES CONNECTED 

TO THE INTERNET (E.G., SMARTPHONES, TABLETS). 

TYPES OF CYBER CRIMES

•CYBER TRESPASSING

•CYBER SPOOFING

•CYBER PIRACY

•CYBER BLACKMAIL

•IDENTITY THEFT

•CYBER TERRORISM

•CYBER VANDALISM

•CYBER GERM WARFARE

CYBER TRESPASSING

•A PERSON INTENTIONALLY AND

WITHOUT AUTHORIZATION ACCESSES,

ALTERS, DELETES, DAMAGES, DESTROYS,

OR DISRUPTS ANY COMPUTER.

CYBER SPOOFING

•A FRAUDULENT OR MALICIOUS PRACTICE IN

WHICH COMMUNICATION IS SENT FROM AN

UNKNOWN SOURCE TO THE RECEIVER WITH

INTENT TO CAUSE HARM.

CYBER SPOOFING

•EMAIL SPOOFING – CREATION OF EMAIL MESSAGES WITH A FORGED SENDER ADDRESS.

•PHISHING – ACTIVITY OF DEFRAUDING AN ONLINE ACCOUNT HOLDER OF FINANCIAL INFORMATION..

CYBER SPOOFING

•KEYLOGGING – ALLOWS A PERSON TO TRACK KEY STROKES ON YOUR COMPUTER.

CYBER SPOOFING

•SPYWARE – INSTALLED SOFTWARE TO GATHER INFORMATION ABOUT AN INTERNET USER’S BROWSING HABITS.

•HACKING – A PERSON SECRETLY GETS ACCESS TO A COMPUTER SYSTEM IN ORDER TO GET INFORMATION, OR CAUSE DAMAGE.

CYBER SPOOFING•THE PERSON IS TRYING TO GET PERSONAL INFORMATION

• TO OPEN A BANK ACCOUNT IN ANOTHER’S NAME,

•PURCHASE ITEMS WITH ANOTHER’S CREDIT CARD, OR

•TAKE OUT A LOAN IN ANOTHER’S NAME.

CYBER PIRACY

•ILLEGAL REPRODUCTION AND DISTRIBUTION

OF SOFTWARE APPLICATIONS, GAMES,

MOVIES AND AUDIO CDS.

•MAKING COPIES WITHOUT PERMISSION

CYBER BLACKMAIL

•FORM OF BULLYING THAT IS AIMED AT

TEENS, COLLEGE STUDENTS, AND

YOUNGER CHILDREN USING WEBCAMS.

IDENTITY THEFT

•THE FRAUDULENT ACQUISITION AND USE

OF A PERSON’S PRIVATE IDENTIFYING

INFORMATION.

CYBER TERRORISM

•THE POLITICALLY MOTIVATED USE OF

INFORMATION TECHNOLOGY TO CAUSE

SEVERE DISRUPTION AND/OR FEAR

AMONG A SOCIETY.

CYBER VANDALISM

•TO CHANGE ANOTHER’S WEBSITE WITH

MALICIOUS INTENT.

CYBER GERM WARFARE

•THE ACTIVITY OF USING THE INTERNET TO

ATTACK A COUNTRY’S COMPUTERS IN

ORDER TO DAMAGE THINGS SUCH AS

COMMUNICATION AND TRANSPORTATION

SYSTEMS.

CYBER FORENSICS

•THE INVESTIGATION OF LEGAL EVIDENCE

FOUND ON COMPUTERS AND OTHER

DIGITAL STORAGE DEVICES.

COMPARE CYBER CRIMES AND CYBER TORTS

CYBER CRIMES VS. CYBER TORTS

CYBER CRIMES

•CRIMES DIRECTED AT

PEOPLE USING COMPUTERS

AND ALSO AGAINST OTHER

COMPUTERS.

CYBER TORTS

• IS THE LEGAL TERM FOR

CYBER CRIME. A CYBER CRIME

HARMS A PARTICULAR

PERSON OR PERSONS AS A

RESULT OF THE CRIME.

CYBER TORTS

•DEFAMATION – USING THE INTERNET WITH FALSE STATEMENTS THAT HARMS THE REPUTATION OF AN INDIVIDUAL, BUSINESS, PRODUCT, GROUP, GOVERNMENT, RELIGION, OR NATION.

•CYBER BULLYING – USING THE INTERNET TORMENTING, THREATENING, HARASSING, HUMILIATING, EMBARRASSING, OR OTHERWISE TARGETING INDIVIDUALS.

CYBER TORTS•CYBER STALKING – THE REPEATED USE OF ELECTRONIC

COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS).

•TRESPASS OF CHATTELS – INTERFERENCE WITH ANOTHER PERSON’S LAWFUL POSSESSION OF MOVEABLE PERSONAL PROPERTY – TAKING OR USING WITHOUT PERMISSION ANOTHER PERSONS ELECTRONIC DEVICE OR SOFTWARE.

CYBER TORTS

•MISREPRESENTATION OR FRAUD – USING THE INTERNET OR COMPUTER DEVICES WITH INTENT OF IMPERSONATING FOR PERSONAL OR FINANCIAL GAIN.

•CYBER INVASION OF PRIVACY – INTRUSION INTO THE PERSONAL LIFE OF ANOTHER.

DESCRIBE INTELLECTUAL PROPERTY RIGHTS AND

COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES

INTELLECTUAL PROPERTY RIGHTS RELATED TO DIGITAL PURCHASES

•LAWS PROTECTING THE CREATION OF ORIGINAL WORK (MUSIC, LITERATURE, AND ARTISTIC WORKS, DISCOVERIES AND INVENTIONS, COPYRIGHTS, TRADEMARKS, PATENTS, INDUSTRIAL DESIGN RIGHTS, TRADE DRESS, AND TRADE SECRETS.

COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES

•A FORM OF PROTECTION PROVIDED TO AUTHORS OF “ORIGINAL WORKS OF AUTHORSHIP” THAT INCLUDES LITERARY, DRAMATIC, MUSICAL, ARTISTIC AND CERTAIN OTHER CREATIVE WORKS.

HOW DOES THE RIGHTS AND LAWS DIFFER FOR DIGITAL PURCHASES?

•PURCHASES MADE USING TECHNOLOGY

IS PERMANENT AND CAN NOT BE

DELETED.

DESCRIBE LAWS RELATED TO E‐COMMERCE.

E‐COMMERCE.

•IS THE TRADING IN PRODUCTS OR

SERVICES USING A COMPUTER

NETWORK.

DIGITAL SIGNATURES

•IS AN ELECTRONIC RATHER THAN A WRITTEN

SIGNATURE THAT CAN BE USED BY

SOMEONE TO AUTHENTICATE THE IDENTITY

OF THE SENDER OF A MESSAGE OR OF THE

SIGNER OF A DOCUMENT.

THE E-SIGN ACT

•A US FEDERAL LAW PASSED BY THE US CONGRESS

TO FACILITATE THE USE OF ELECTRONIC RECORDS

AND ELECTRONIC SIGNATURES IN INTERSTATE AND

FOREIGN COMMERCE BY ENSURING THE VALIDITY

AND LEGAL EFFECT OF CONTRACTS ENTERED INTO

ELECTRONICALLY.

JURISDICTIONAL ISSUES OF BUYING PRODUCTS ONLINE FROM DIFFERENT STATES.

•COMPANIES CAN EASILY SELL TO CONSUMERS ANYWHERE IN THE WORLD WITH NO PHYSICAL PRESENCE IN ANY OF THE LOCATIONS. AND SO FAR, REGULATIONS AND LAW ARE A BIT MURKY. FUNDAMENTALLY, LEGAL EXPERTS SAY, FOR A COURT TO EXERCISE JURISDICTION OVER A WEB SITE, IT MUST DETERMINE IF CERTAIN CONSTITUTIONAL LIMITS OF DUE PROCESS ARE SATISFIED. IN ORDER TO DO THIS, A SITE HAS TO HAVE SOME PRESENCE IN THE STATE. - SEE MORE AT: HTTP://WWW.KLCPAS.COM/SORT-OUT-THE-JURISDICTIONAL-ISSUES-OF-E-COMMERCE/#STHASH.KLPE7VRF.DPUF

EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY 

AFFECTS A CONTRACT.

EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY AFFECTS A CONTRACT.

•TECHNOLOGY ALLOWS US TO BE

CONNECTED WORLD WIDE AND ALLOWS

CONTRACTS AND PURCHASES TO BE

COMPLETED MUCH FASTER.

EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY 

AFFECT THE DIFFERENT AREAS OF LAW

DUE TO ADVANCES IN TECHNOLOGY AND THE INTERNET

•THE AMOUNT OF CRIMES RELATED TO

INTELLECTUAL PROPERTY HAS INCREASED.

•HOWEVER, TECHNOLOGY CAN HELP SOLVE

CASES.

ADVANCES IN TECHNOLOGY

•PROMOTES CONSIST LAWS FOR

INTELLECTUAL PROPERTY, CONTRACTS,

CRIMES, TORTS/CIVIL MATTERS, AS WELL

AS INTERNATIONAL BUSINESS.

EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY AFFECT THE DIFFERENT AREAS OF LAW•TECHNOLOGY HELPS REACH A LARGER NUMBER OF PEOPLE

•TECHNOLOGY INCREASES THE SPEED OF WHICH WE CAN EXECUTE CONTRACTS.

•HOWEVER, LAWS NEED TO BE RE-EVALUATED CONSTANTLY DUE TO TECHNOLOGY ADVANCES.

DESCRIBE THE VARIOUS TYPES OF FEDERAL AND STATE STATUTES DESIGNED TO

COMBAT COMPUTER CRIME.

ELECTRONIC COMMUNICATIONS PRIVACY ACT

•A US FEDERAL STATUTE THAT PROHIBITS

A THIRD PARTY FROM INTERCEPTING OR

DISCLOSING COMMUNICATIONS

WITHOUT AUTHORIZATION.

CYBER SECURITY ENHANCEMENT ACT

•INCREASES THE SECURITY OF FEDERAL NETWORKS

AND INFORMATION SYSTEMS, IMPROVES THE

TRANSFER OF CYBERSECURITY TECHNOLOGIES TO

THE MARKETPLACE, TRAIN A CYBERSECURITY

WORKFORCE, AND COORDINATES AND

PRIORITIZE FEDERAL CYBERSECURITY RESEARCH

AND DEVELOPMENT EFFORTS.

DIGITAL MILLENNIUM COPYRIGHT ACT

•A 1998 US LAW INTENDED TO UPDATE

COPYRIGHT LAW FOR ELECTRONIC

COMMERCE AND ELECTRONIC CONTENT

PROVIDERS. IT CRIMINALIZES THE

CIRCUMVENTION OF ELECTRONIC AND

DIGITAL COPYRIGHT PROTECTION SYSTEMS.

ECONOMIC ESPIONAGE ACT

•DEFINES THE TERM “ECONOMIC ESPIONAGE” AS THE THEFT OR MISAPPROPRIATION OF A TRADE SECRET WITH THE INTENT OR KNOWLEDGE THAT THE OFFENSE WILL BENEFIT ANY FOREIGN GOVERNMENT, FOREIGN INSTRUMENTALITY, OR FOREIGN AGENT.

FRAUDULENT ONLINE IDENTITY SANCTIONS ACT (FOISA)

•MAKES IT A VIOLATION OF TRADEMARK AND COPYRIGHT LAW IF A PERSON KNOWINGLY PROVIDED, OR CAUSED TO BE PROVIDED, MATERIALLY FALSE CONTACT INFORMATION IN MAKING, MAINTAINING, OR RENEWING THE REGISTRATION OF A DOMAIN NAME USED IN CONNECTION WITH THE VIOLATION.

COMPUTER SOFTWARE PRIVACY AND CONTROL ACT (CSPCA)

•TO PREVENT DECEPTIVE SOFTWARE

TRANSMISSION PRACTICES IN ORDER TO

SAFEGUARD COMPUTER PRIVACY,

MAINTAIN COMPUTER CONTROL, AND

PROTECT INTERNET COMMERCE.

DESCRIBE THE RAMIFICATIONS OF IMPROPER USE OF BUSINESS TECHNOLOGY AND PROPERTY

WHAT ARE THE CONSEQUENCES FROM USING BUSINESS TECHNOLOGY FOR PERSONAL USE?

•KNOW THE RULES AND REGULATIONS AT

WORK

•EMPLOYEES CAN BE FIRED FOR IMPROPER

USE

Recommended