Business Law II

advertisement
BUSINESS LAW II
Chapter 19.1
Cyberlaw and Cybercrime
DEVELOPMENT OF CYBERLAW
 Cyberlaw– the area of law which
concerns computers and computerrelated crimes
 Cybercrime—any criminal activity
associated with a computer
TWO APPROACHES TO DEVELOP
CYBERLAW:
1. Cybertresspass Approach (or computer
tresspass)

Any illegal activity already in the criminal code
committed by using a computer
2. Rewriting of Criminal Code
 Some states have written statutes for every
crime that can possibly be committed by
using a computer
 This is difficult since each new statute must
be individually created by state legislature
CYBERCRIMES
1. Cyberspoofing: When a user creates a
false identity or adopts an identity of
another user while using computer to
commit fraud (Phishing)
 False emails, false websites
 They attempt to lure people and obtain
personal information of their victims
2. Cyberpiracy: Using a computer to steal
data stored in digital format
(intellectual property theft)
CYBERCRIMES CONT.
3. Cyberblackmail: Use of data
unlawfully obtained by computer to
pressure victim into granting payoff
Users who spend time in chat rooms
are vulnerable
Cyberblackmaler often befriends a
person, learns damaging information,
then uses it to extort money
CYBERCRIMES CONT.
4. Identity Theft—using computer to steal
financial, employment, educational, medical,
and personal information


Attempt to obtain credit card numbers, PINS, SSN,
access codes, etc.
Use the data to empty bank accounts, run up credit
card bill, steal cash, and disrupt personal life.
5. Cyberterrorism—using computer person
interrupts national infrastructure

Powergrids, air traffic control system, and the
national defense
CYBERCRIMES CONT.
4. Cybervandalism—disrupting,
damaging, or destroying web site or
computer network
 Hackers- usually done for revenge or to
attack a business
5. Cybergerm Warfare—transmit
computer virus to destroy others
computer files/systems
 Firewalls and anti-virus software can
sometimes block many viruses
CYBERTORTS
Definition—invasion, theft, falsification, misuse
or deletion of data stored in computer to
commit a crime
1. Cyberdefamation—communication via
computer or other electronic device of false
data to damage person’s reputation
2. Cyberinvasion of Privacy—unwelcome
intrusion into private matters of another
carried out or sustained by computer
CYBER ASSESS
What crime involved using a computer to
obtain a payoff?
What crime involved disrupting
infrastructure?
What crime involves using a computer to
steal financial, employment, or personal
information?
Download