What will happen when there is no cybercrime law?
QUESTION
What will happen when there is no cybercrime law?
ANSWER
INTRODUCTION
Cyber crime is an activity done using computers and internet. We can say that it is an unlawful acts wherein the computer either a tool or target or both.The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1976 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the EIK Cloner.
CRIME & CYBERCRIME
• Crime – Engaging in conduct that has been outlawed by a particular society
• Cybercrime – Differ in the tool: guns are change for computers Harm to: Individuals, property, government and morality
• Cybercrime is any illegal act committed using a computer network (especially the Internet).
• Criminal activities that take place in cyberspace (the Internet).
• Computer used to commit a crime – Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing
• Computer as a target of a crime – Viruses, worms, industrial espionage, software piracy, hacking
CLASSIFICATION OF CYBER CRIME
– Offences against the confidentiality integrity and availability of computer data and systems
– Content-related offences
– Copyright-related offences
TYPES OF CYBER CRIME
CYBER LAW IN USA
• Protect America Act of 2007
• Key component “Electronic Surveillance”
• USA Patriot ACT
– Hacking, cracking, extortion, fraud and malware.
• Advertising Law
• E-Signatures
• Electronic Contracts
• Cryptography Laws
• Electronic Evidence
• Copyright Law
• Domain Names
• Confidentiality
NATIONAL & INTERNATIONAL EFFORTS
• First Wave (privacy)
– Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc.
• Second Wave (property)
– Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.
• Third Wave (intellectual property)
• Convention on Cybercrime
– Ensuring that countries adopt procedural laws.
– Harmonizing national cybercrime law.
CYBER LAW
• Law governing cyber space
• Cyber law encompasses laws relating to:
– Cyber Crimes
– Electronic and Digital Signatures
– Intellectual Property
– Data Protection and Privacy
It is the area of law that deals with the Internet's relationship to technological and electronic elements, including computers, software, hardware and information systems (IS).Cyber law is also known as Cyber Law or Internet Law. Cyber laws prevent or reduce large scale damage from cybercriminal activities by protecting information access, privacy, communications, intellectual property (IP) and freedom of speech related to the use of the Internet, websites, email, computers, cell phones, software and hardware, such as data storage devices.The increase in Internet traffic has led to a higher proportion of legal issues worldwide. Because cyber laws vary by jurisdiction and country, enforcement is challenging, and restitution ranges from fines to imprisonment.
THE INFORMATION TECHNOLOGY AMENDMENT ACT, 2008 (IT ACT 2008)
MAIN OBJECTIVES OF I T ACT 2000
The following are its main objectives of I T Act 2000
1. It is objective of I.T. Act 2000 to give legal recognition to any transaction which is done by electronic way or use of internet.
2. To give legal recognition to digital signature for accepting any agreement via computer.
3. To provide facility of filling document online relating to school admission or registration in employment exchange.
4. According to I.T. Act 2000, any company can store their data in electronic storage.
5. To stop computer crime and protect privacy of internet users.
6. To give legal recognition for keeping books of accounts by bankers and other companies in electronic form.
7. To make more power to IPO, RBI and Indian Evidence act for restricting electronic crime.
TEN COMMANDMENTS OF COMPUTER ETHICS
1. Thou shalt not copy or use proprietary software for which you have not paid.
2. Thou shalt not use other people's computer resources without authorization or proper compensation.
3. Thou shalt not appropriate other people's intellectual output.
4. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
5. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
6. Thou shalt not use a computer to harm other people.
7. Thou shalt not interfere with other people's computer work.
8. Thou shalt not snoop around in other people's computer files.
9. Thou shalt not use a computer to steal.
10. Thou shalt not use a computer to bear false witness.
CYBER SECURITY
ADVANTAGES OF CYBER SECURITY
EFFECTS OF LACK OF CYBERCRIME LAW
Types of cyber crime
PROTECT YOUR SYSTEM
• Use anti-virus software and firewalls - keep them up to date
• Keep your operating system up to date with critical security updates and patches
• Dont open emails or attachments from unknown sources
• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist
• Back-up your computer data on disks or CDs often
• Dont share access to your computers with strangers
• If you have a wi-fi network, password protect it
• Disconnect from the Internet when not in use
• Re-evaluate your security on a regular basis
• Make sure your employees and family members know this info too.
CONCLUSION
Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily. In fact, it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law. So, to make us a safer we must need cyber security.
Get Answers For Free
Most questions answered within 1 hours.