chapter 19.1 cyberlaw and cybercrime business law ii

9
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

Upload: wendy-morgan

Post on 02-Jan-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

Chapter 19.1Cyberlaw and Cybercrime

BUSINESS LAW II

Page 2: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

Cyberlaw– the area of law which concerns computers and computer-related crimes

Cybercrime—any criminal activity associated with a computer

DEVELOPMENT OF CYBERLAW

Page 3: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

1. Cybertresspass Approach (or computer tresspass)

Any illegal activity already in the criminal code committed by using a computer

2. Rewriting of Criminal Code Some states have written statutes for every

crime that can possibly be committed by using a computer

This is difficult since each new statute must be individually created by state legislature

TWO APPROACHES TO DEVELOP CYBERLAW:

Page 4: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

1. Cyberspoofing: When a user creates a false identity or adopts an identity of another user while using computer to commit fraud (Phishing)

False emails, false websites They attempt to lure people and obtain

personal information of their victims

2. Cyberpiracy: Using a computer to steal data stored in digital format

(intellectual property theft)

CYBERCRIMES

Page 5: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

3. Cyberblackmail: Use of data unlawfully obtained by computer to pressure victim into granting payoff

Users who spend time in chat rooms are vulnerable

Cyberblackmaler often befriends a person, learns damaging information, then uses it to extort money

CYBERCRIMES CONT.

Page 6: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

4. Identity Theft—using computer to steal financial, employment, educational, medical, and personal information

Attempt to obtain credit card numbers, PINS, SSN, access codes, etc.

Use the data to empty bank accounts, run up credit card bill, steal cash, and disrupt personal life.

5. Cyberterrorism—using computer person interrupts national infrastructure

Powergrids, air traffic control system, and the national defense

CYBERCRIMES CONT.

Page 7: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

4.Cybervandalism—disrupting, damaging, or destroying web site or computer network

Hackers- usually done for revenge or to attack a business

5.Cybergerm Warfare—transmit computer virus to destroy others computer files/systems

Firewalls and anti-virus software can sometimes block many viruses

CYBERCRIMES CONT.

Page 8: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

Definition—invasion, theft, falsification, misuse or deletion of data stored in computer to commit a crime1. Cyberdefamation—communication via

computer or other electronic device of false data to damage person’s reputation

2. Cyberinvasion of Privacy—unwelcome intrusion into private matters of another carried out or sustained by computer

CYBERTORTS

Page 9: Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

What crime involved using a computer to obtain a payoff?

What crime involved disrupting infrastructure?

What crime involves using a computer to steal financial, employment, or personal information?

CYBER ASSESS