BUSINESS LAW II Chapter 19.1 Cyberlaw and Cybercrime DEVELOPMENT OF CYBERLAW Cyberlaw– the area of law which concerns computers and computerrelated crimes Cybercrime—any criminal activity associated with a computer TWO APPROACHES TO DEVELOP CYBERLAW: 1. Cybertresspass Approach (or computer tresspass) Any illegal activity already in the criminal code committed by using a computer 2. Rewriting of Criminal Code Some states have written statutes for every crime that can possibly be committed by using a computer This is difficult since each new statute must be individually created by state legislature CYBERCRIMES 1. Cyberspoofing: When a user creates a false identity or adopts an identity of another user while using computer to commit fraud (Phishing) False emails, false websites They attempt to lure people and obtain personal information of their victims 2. Cyberpiracy: Using a computer to steal data stored in digital format (intellectual property theft) CYBERCRIMES CONT. 3. Cyberblackmail: Use of data unlawfully obtained by computer to pressure victim into granting payoff Users who spend time in chat rooms are vulnerable Cyberblackmaler often befriends a person, learns damaging information, then uses it to extort money CYBERCRIMES CONT. 4. Identity Theft—using computer to steal financial, employment, educational, medical, and personal information Attempt to obtain credit card numbers, PINS, SSN, access codes, etc. Use the data to empty bank accounts, run up credit card bill, steal cash, and disrupt personal life. 5. Cyberterrorism—using computer person interrupts national infrastructure Powergrids, air traffic control system, and the national defense CYBERCRIMES CONT. 4. Cybervandalism—disrupting, damaging, or destroying web site or computer network Hackers- usually done for revenge or to attack a business 5. Cybergerm Warfare—transmit computer virus to destroy others computer files/systems Firewalls and anti-virus software can sometimes block many viruses CYBERTORTS Definition—invasion, theft, falsification, misuse or deletion of data stored in computer to commit a crime 1. Cyberdefamation—communication via computer or other electronic device of false data to damage person’s reputation 2. Cyberinvasion of Privacy—unwelcome intrusion into private matters of another carried out or sustained by computer CYBER ASSESS What crime involved using a computer to obtain a payoff? What crime involved disrupting infrastructure? What crime involves using a computer to steal financial, employment, or personal information?