cyber law lesson...cyber torts • cyber stalking – the repeated use of electronic communication...
TRANSCRIPT
EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES
WE WILL EXAMINE THE LAWS RELATED TO CRIMES COMMITTED WHILE USING COMPUTERS AND DEVICES CONNECTED
TO THE INTERNET (E.G., SMARTPHONES, TABLETS).
TYPES OF CYBER CRIMES
•CYBER TRESPASSING
•CYBER SPOOFING
•CYBER PIRACY
•CYBER BLACKMAIL
•IDENTITY THEFT
•CYBER TERRORISM
•CYBER VANDALISM
•CYBER GERM WARFARE
CYBER TRESPASSING
•A PERSON INTENTIONALLY AND
WITHOUT AUTHORIZATION ACCESSES,
ALTERS, DELETES, DAMAGES, DESTROYS,
OR DISRUPTS ANY COMPUTER.
CYBER SPOOFING
•A FRAUDULENT OR MALICIOUS PRACTICE IN
WHICH COMMUNICATION IS SENT FROM AN
UNKNOWN SOURCE TO THE RECEIVER WITH
INTENT TO CAUSE HARM.
CYBER SPOOFING
•EMAIL SPOOFING – CREATION OF EMAIL MESSAGES WITH A FORGED SENDER ADDRESS.
•PHISHING – ACTIVITY OF DEFRAUDING AN ONLINE ACCOUNT HOLDER OF FINANCIAL INFORMATION..
CYBER SPOOFING
•KEYLOGGING – ALLOWS A PERSON TO TRACK KEY STROKES ON YOUR COMPUTER.
CYBER SPOOFING
•SPYWARE – INSTALLED SOFTWARE TO GATHER INFORMATION ABOUT AN INTERNET USER’S BROWSING HABITS.
•HACKING – A PERSON SECRETLY GETS ACCESS TO A COMPUTER SYSTEM IN ORDER TO GET INFORMATION, OR CAUSE DAMAGE.
CYBER SPOOFING•THE PERSON IS TRYING TO GET PERSONAL INFORMATION
• TO OPEN A BANK ACCOUNT IN ANOTHER’S NAME,
•PURCHASE ITEMS WITH ANOTHER’S CREDIT CARD, OR
•TAKE OUT A LOAN IN ANOTHER’S NAME.
CYBER PIRACY
•ILLEGAL REPRODUCTION AND DISTRIBUTION
OF SOFTWARE APPLICATIONS, GAMES,
MOVIES AND AUDIO CDS.
•MAKING COPIES WITHOUT PERMISSION
CYBER BLACKMAIL
•FORM OF BULLYING THAT IS AIMED AT
TEENS, COLLEGE STUDENTS, AND
YOUNGER CHILDREN USING WEBCAMS.
IDENTITY THEFT
•THE FRAUDULENT ACQUISITION AND USE
OF A PERSON’S PRIVATE IDENTIFYING
INFORMATION.
CYBER TERRORISM
•THE POLITICALLY MOTIVATED USE OF
INFORMATION TECHNOLOGY TO CAUSE
SEVERE DISRUPTION AND/OR FEAR
AMONG A SOCIETY.
CYBER VANDALISM
•TO CHANGE ANOTHER’S WEBSITE WITH
MALICIOUS INTENT.
CYBER GERM WARFARE
•THE ACTIVITY OF USING THE INTERNET TO
ATTACK A COUNTRY’S COMPUTERS IN
ORDER TO DAMAGE THINGS SUCH AS
COMMUNICATION AND TRANSPORTATION
SYSTEMS.
CYBER FORENSICS
•THE INVESTIGATION OF LEGAL EVIDENCE
FOUND ON COMPUTERS AND OTHER
DIGITAL STORAGE DEVICES.
COMPARE CYBER CRIMES AND CYBER TORTS
CYBER CRIMES VS. CYBER TORTS
CYBER CRIMES
•CRIMES DIRECTED AT
PEOPLE USING COMPUTERS
AND ALSO AGAINST OTHER
COMPUTERS.
CYBER TORTS
• IS THE LEGAL TERM FOR
CYBER CRIME. A CYBER CRIME
HARMS A PARTICULAR
PERSON OR PERSONS AS A
RESULT OF THE CRIME.
CYBER TORTS
•DEFAMATION – USING THE INTERNET WITH FALSE STATEMENTS THAT HARMS THE REPUTATION OF AN INDIVIDUAL, BUSINESS, PRODUCT, GROUP, GOVERNMENT, RELIGION, OR NATION.
•CYBER BULLYING – USING THE INTERNET TORMENTING, THREATENING, HARASSING, HUMILIATING, EMBARRASSING, OR OTHERWISE TARGETING INDIVIDUALS.
CYBER TORTS•CYBER STALKING – THE REPEATED USE OF ELECTRONIC
COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS).
•TRESPASS OF CHATTELS – INTERFERENCE WITH ANOTHER PERSON’S LAWFUL POSSESSION OF MOVEABLE PERSONAL PROPERTY – TAKING OR USING WITHOUT PERMISSION ANOTHER PERSONS ELECTRONIC DEVICE OR SOFTWARE.
CYBER TORTS
•MISREPRESENTATION OR FRAUD – USING THE INTERNET OR COMPUTER DEVICES WITH INTENT OF IMPERSONATING FOR PERSONAL OR FINANCIAL GAIN.
•CYBER INVASION OF PRIVACY – INTRUSION INTO THE PERSONAL LIFE OF ANOTHER.
DESCRIBE INTELLECTUAL PROPERTY RIGHTS AND
COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES
INTELLECTUAL PROPERTY RIGHTS RELATED TO DIGITAL PURCHASES
•LAWS PROTECTING THE CREATION OF ORIGINAL WORK (MUSIC, LITERATURE, AND ARTISTIC WORKS, DISCOVERIES AND INVENTIONS, COPYRIGHTS, TRADEMARKS, PATENTS, INDUSTRIAL DESIGN RIGHTS, TRADE DRESS, AND TRADE SECRETS.
COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES
•A FORM OF PROTECTION PROVIDED TO AUTHORS OF “ORIGINAL WORKS OF AUTHORSHIP” THAT INCLUDES LITERARY, DRAMATIC, MUSICAL, ARTISTIC AND CERTAIN OTHER CREATIVE WORKS.
HOW DOES THE RIGHTS AND LAWS DIFFER FOR DIGITAL PURCHASES?
•PURCHASES MADE USING TECHNOLOGY
IS PERMANENT AND CAN NOT BE
DELETED.
DESCRIBE LAWS RELATED TO E‐COMMERCE.
E‐COMMERCE.
•IS THE TRADING IN PRODUCTS OR
SERVICES USING A COMPUTER
NETWORK.
DIGITAL SIGNATURES
•IS AN ELECTRONIC RATHER THAN A WRITTEN
SIGNATURE THAT CAN BE USED BY
SOMEONE TO AUTHENTICATE THE IDENTITY
OF THE SENDER OF A MESSAGE OR OF THE
SIGNER OF A DOCUMENT.
THE E-SIGN ACT
•A US FEDERAL LAW PASSED BY THE US CONGRESS
TO FACILITATE THE USE OF ELECTRONIC RECORDS
AND ELECTRONIC SIGNATURES IN INTERSTATE AND
FOREIGN COMMERCE BY ENSURING THE VALIDITY
AND LEGAL EFFECT OF CONTRACTS ENTERED INTO
ELECTRONICALLY.
JURISDICTIONAL ISSUES OF BUYING PRODUCTS ONLINE FROM DIFFERENT STATES.
•COMPANIES CAN EASILY SELL TO CONSUMERS ANYWHERE IN THE WORLD WITH NO PHYSICAL PRESENCE IN ANY OF THE LOCATIONS. AND SO FAR, REGULATIONS AND LAW ARE A BIT MURKY. FUNDAMENTALLY, LEGAL EXPERTS SAY, FOR A COURT TO EXERCISE JURISDICTION OVER A WEB SITE, IT MUST DETERMINE IF CERTAIN CONSTITUTIONAL LIMITS OF DUE PROCESS ARE SATISFIED. IN ORDER TO DO THIS, A SITE HAS TO HAVE SOME PRESENCE IN THE STATE. - SEE MORE AT: HTTP://WWW.KLCPAS.COM/SORT-OUT-THE-JURISDICTIONAL-ISSUES-OF-E-COMMERCE/#STHASH.KLPE7VRF.DPUF
EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY
AFFECTS A CONTRACT.
EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY AFFECTS A CONTRACT.
•TECHNOLOGY ALLOWS US TO BE
CONNECTED WORLD WIDE AND ALLOWS
CONTRACTS AND PURCHASES TO BE
COMPLETED MUCH FASTER.
EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY
AFFECT THE DIFFERENT AREAS OF LAW
DUE TO ADVANCES IN TECHNOLOGY AND THE INTERNET
•THE AMOUNT OF CRIMES RELATED TO
INTELLECTUAL PROPERTY HAS INCREASED.
•HOWEVER, TECHNOLOGY CAN HELP SOLVE
CASES.
ADVANCES IN TECHNOLOGY
•PROMOTES CONSIST LAWS FOR
INTELLECTUAL PROPERTY, CONTRACTS,
CRIMES, TORTS/CIVIL MATTERS, AS WELL
AS INTERNATIONAL BUSINESS.
EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY AFFECT THE DIFFERENT AREAS OF LAW•TECHNOLOGY HELPS REACH A LARGER NUMBER OF PEOPLE
•TECHNOLOGY INCREASES THE SPEED OF WHICH WE CAN EXECUTE CONTRACTS.
•HOWEVER, LAWS NEED TO BE RE-EVALUATED CONSTANTLY DUE TO TECHNOLOGY ADVANCES.
DESCRIBE THE VARIOUS TYPES OF FEDERAL AND STATE STATUTES DESIGNED TO
COMBAT COMPUTER CRIME.
ELECTRONIC COMMUNICATIONS PRIVACY ACT
•A US FEDERAL STATUTE THAT PROHIBITS
A THIRD PARTY FROM INTERCEPTING OR
DISCLOSING COMMUNICATIONS
WITHOUT AUTHORIZATION.
CYBER SECURITY ENHANCEMENT ACT
•INCREASES THE SECURITY OF FEDERAL NETWORKS
AND INFORMATION SYSTEMS, IMPROVES THE
TRANSFER OF CYBERSECURITY TECHNOLOGIES TO
THE MARKETPLACE, TRAIN A CYBERSECURITY
WORKFORCE, AND COORDINATES AND
PRIORITIZE FEDERAL CYBERSECURITY RESEARCH
AND DEVELOPMENT EFFORTS.
DIGITAL MILLENNIUM COPYRIGHT ACT
•A 1998 US LAW INTENDED TO UPDATE
COPYRIGHT LAW FOR ELECTRONIC
COMMERCE AND ELECTRONIC CONTENT
PROVIDERS. IT CRIMINALIZES THE
CIRCUMVENTION OF ELECTRONIC AND
DIGITAL COPYRIGHT PROTECTION SYSTEMS.
ECONOMIC ESPIONAGE ACT
•DEFINES THE TERM “ECONOMIC ESPIONAGE” AS THE THEFT OR MISAPPROPRIATION OF A TRADE SECRET WITH THE INTENT OR KNOWLEDGE THAT THE OFFENSE WILL BENEFIT ANY FOREIGN GOVERNMENT, FOREIGN INSTRUMENTALITY, OR FOREIGN AGENT.
FRAUDULENT ONLINE IDENTITY SANCTIONS ACT (FOISA)
•MAKES IT A VIOLATION OF TRADEMARK AND COPYRIGHT LAW IF A PERSON KNOWINGLY PROVIDED, OR CAUSED TO BE PROVIDED, MATERIALLY FALSE CONTACT INFORMATION IN MAKING, MAINTAINING, OR RENEWING THE REGISTRATION OF A DOMAIN NAME USED IN CONNECTION WITH THE VIOLATION.
COMPUTER SOFTWARE PRIVACY AND CONTROL ACT (CSPCA)
•TO PREVENT DECEPTIVE SOFTWARE
TRANSMISSION PRACTICES IN ORDER TO
SAFEGUARD COMPUTER PRIVACY,
MAINTAIN COMPUTER CONTROL, AND
PROTECT INTERNET COMMERCE.
DESCRIBE THE RAMIFICATIONS OF IMPROPER USE OF BUSINESS TECHNOLOGY AND PROPERTY
WHAT ARE THE CONSEQUENCES FROM USING BUSINESS TECHNOLOGY FOR PERSONAL USE?
•KNOW THE RULES AND REGULATIONS AT
WORK
•EMPLOYEES CAN BE FIRED FOR IMPROPER
USE