We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byReed Blanch
Modified about 1 year ago
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Lecture 14: Crime
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Criminal Law Even though there is a victim, the injury is to “society,” so the government prosecutes Unauthorized access Theft of services Alteration/destruction of data Trafficking in passwords Computer fraud Denial of service
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Identity Theft 18 U.S.C. 1028(a) prohibits “knowingly and without lawful authority”18 U.S.C. 1028(a) producing a real or false identification document transferring a stolen identification document possessing five or more real or false identification documents with intent to use transfers or uses a means of identification of another person with the intent to commit … any unlawful activity that constitutes a violation of Federal law, or … felony under … State or local law Penalty: 15, 20 or 25 years
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Computer Fraud and Abuse Act Fraud in connection with access devices. 18 U.S.C. § U.S.C. § 1029 “access device” means any card, plate, code, account number, electronic serial number, mobile identification number, PIN, or other … identifier or other means of account access that can be used … to obtain money, goods, services, or any other thing of value, or … to initiate a transfer of funds Prohibits use or trafficking in counterfeit access devices Penalty: 10, 15 or 20 years Attempt carries same punishment
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Government Response U.S. Government Identity Theft Site FTC Identity Theft Site Identity Theft and Fraud (Dep’t of Justice)Identity Theft and Fraud Identity Theft Resources (Privacy Rights Clearinghouse)Identity Theft Resources
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Extortion, 18 U.S.C. § U.S.C. §875 “Whoever, with intent to extort from any person, firm, association, or corporation, any money or other thing of value, transmits in interstate or foreign commerce any communication containing any threat to injure the property or reputation of the addressee or of another or the reputation of a deceased person or any threat to accuse the addressee or any other person of a crime, shall be fined under this title or imprisoned not more than two years, or both.”
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Pornography Federal statute, 18 U.S.C. §2252: Applies to any person who - (1) knowingly transports, ships, receives or distributes in interstate or foreign commerce by any means including by computer or mails, any visual depiction of a minor engaging in sexually explicit conduct.18 U.S.C. §2252 U.S. v. Hockings, No (9th Cir. 11/21/97): Computer graphic interchange files (GIFs) in binary format fall within the definition of "visual depictions" as contemplated by 18 U.S.C. §§ 2252(a)(1) and (4)(B). The fact that such files require the use of personal computer hardware and software to depict images of child pornography does not put them outside the statute, the court held, analogizing to an earlier case in which undeveloped film was also held to constitute a "visual depiction" under the statute.
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cyberstalking “It is the intent of this act to clarify that electronic communications are included in the actions that can constitute the crimes of harassment and stalking.” Cal. Penal Code (a) Any person who willfully, maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety, or the safety of his or her immediate family, is guilty of the crime of stalking, punishable by imprisonment in a county jail for not more than one year or by a fine of not more than one thousand dollars ($1,000), or by both that fine and imprisonment.Cal. Penal Code 646.9
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cyberstalking Cal. Penal Code §653m. (a) Every person who, with intent to annoy, telephones or makes contact by means of an electronic communication device with another and addresses to or about the other person any obscene language or addresses to the other person any threat to inflict injury to the person or property of the person addressed or any member of his or her family, is guilty of a misdemeanor. Nothing in this subdivision shall apply to telephone calls or electronic contacts made in good faith.Cal. Penal Code §653m
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Current Cases State of Utah v. Amoroso, 1999 Utah App. LEXIS 213 (Ct. App. Ut. 3/4/99): Utah may criminally prosecute an Illinois corporation for liquor sales to Utah residents over the Internet. Court held that there was criminal personal jurisdiction in Utah since the conduct committed in Illinois caused an unlawful result in Utah. FTC v. Craig Lee Hare (S.D. Fla. 4/98): Action for deceptive trade practices arising from on-line “auction” offering sale of computer products that were never delivered. Defendant barred for life from conducting Internet commerce, pleaded guilty to wire fraud and sentenced to six months home detention, three years probation and ordered to pay restitution of over $22,000.
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Current Cases U.S. v. Hoke, Magistrate No M (C.D. Cal. 4/14/99): U.S. Attorney's Office sued Gary Hoke of North Carolina for disseminating misinformation on a counterfeit Bloomberg News Service Web page regarding an alleged merger between his employer PairGain Technology, Inc. and ECI Telecom, Ltd. Hoke was traced by IP addresses from Angelfire.com. Hoke pled guilty, sentenced to five months of home detention, five years probation, and restitution of $93,
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Economic Espionage Act Whoever, intending or knowing that the offense will benefit any foreign government, knowingly - (1) steals, or by fraud, artifice, or deception obtains a trade secret; (2) without authorization copies, downloads, replicates, transmits, or conveys a trade secret; (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen Penalty for organizations: $10 million fine
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Theft of Trade Secrets, 18 U.S.C. § U.S.C. §1832 Whoever (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret; (2) without authorization copies, duplicates, downloads, destroys, replicates, transmits, communicates, or conveys a trade secret; or (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen; commits an offense. Penalty: forfeiture, fine, jail For organizations, $5,000,000 fine
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Denial of Access “Whoever willfully, knowingly, and without authorization accesses... any computer, computer system, or computer network; or whoever willfully, knowingly, and without authorization denies or causes the denial of computer system services to an authorized user of such computer system services... commits [a felony].” Fla. Stat. §815.06Fla. Stat. § “Whoever willfully, knowingly, and without authorization modifies or destroys data, programs, or supporting documentation residing or existing internal or external to a computer, computer system, or computer network commits [a felony]. Fla. Stat. §815.04Fla. Stat. §815.04
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Criminal Jurisdiction When can a state exercise criminal jurisdiction? –Conduct in the state that is an element of the offense –Conduct outside that is an attempt to commit inside –Conduct outside that is conspiracy to commit inside the state + an overt act in the state –Omission to perform a legal duty imposed by the state –Offense is based on a state statute that prohibits conduct outside the state that bears a reasonable relation to a legitimate interest of the state and the actor knows or should know that his conduct is likely to affect that interest. 18 Pa. C.S. § 102
ECOMMERCE LAW AND REGULATION SPRING 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Q A &
Legal Issues in Information Security Chapter 5. Objectives Understand U.S. Criminal Law Understand U.S. Criminal Law Understand State Laws Understand.
Ethical Hacking Module I Introduction to Ethical Hacking.
Davis Wright Tremaine LLP Federal Criminal Enforcement of HIPAA Rebecca L. Williams, R.N., J.D. Partner Davis Wright Tremaine LLP Seattle, WA
ITU- BDT Arab Regional Workshop on Legal Aspects of Child Online Protection Algiers (Algeria), June 2012 Criminal Law – Concepts and Best Practices.
Information Technology Act An overview Date: 27 th November 2008 Venue: National Institute of Financial Management Faridabad Sector-48, Pali Road.
ETHICS FOR PROPERTY MANAGERS Ethics Law and Programs Division Office of the Assistant General Counsel for Administration
Legal Framework Chapter 5. Learning outcomes Explain difference between patent and copyright Computer Miss use Act List 8 principles of Data protection.
STUDENT CODE OF CONDUCT Madison County Schools Dr. David A. Copeland, Superintendent 1275 F Jordan Road, Bldg. B Huntsville, Alabama Telephone:
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
SHYNERRA GRANT LAW Juvenile Protection Orders Alexandria M. Ruden, Esq. Legal Aid Society of Cleveland.
Paper Preparation We are paper boxing today. If you’ve forgotten how to paper box, ask someone nearby. If you need paper, come get a sheet from the back.
Combating Cyber crimes- Law & Enforcement in India The 'Diamond Jubilee Celebration Conference of CIRC'. The 'Diamond Jubilee Celebration Conference of.
CRIMINAL LAW Ld.5, vol.2: Chapter 1 PC 832 Lecture.
Introduction to Computer Forensics Reference: Chapter 13, Computer Network Security, Springer, Joseph M. Kizza.
Cyber Laws in Pakistan Sehrish Mushtaq. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber.
August 9, 2002BUSINESS LAW (Ms. Hawkins)1 CHAPTER 4: CRIMINAL LAW & PROCEDURE Chapter 4 presents criminal law and criminal law procedures.
SJSD Annual Staff Training Employee Handbook Review.
Underwriting Coverage & Analysis Session Presented by: Peter J. Elliott, CPCU, President & CEO Telcom Insurance Group Owned by Those we Serve
How safe are our children over the Internet?-Cyber safety law and policy in India Lina Acca Mathew Assistant Professor of Law Govt. Law College, Ernakulam.
International Telecommunication Union ITU-EC HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa Validation Workshop on Lesotho.
S. Agarwal, St. Xaviers College, Kolkata EthicsEthics, Rules, and LawsRulesLaws Using the computer appropriately.
Copyright 2001 Brett J. Trout Security Concerns with e-Commerce Bretttrout.com.
Mississippi DOM Fraud, Waste, and Abuse (FWA) and HIPAA Training UPDATED 4/1/2014.
Pennsylvania Criminal Justice System Bucks County Technical High School Emergency Services Technology.
EMPLOYEE HANDBOOK REVIEW SJSD Annual Staff Training.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
Bullying and the Law: Issues for Administrators Prepared by: David Trevaskis, Esq. and Stacie Molnar-Main, MSEd. with contributions from Michelle Nutter.
HIPAA The New HIPAA Laws Now Have REAL Penalties; Criminal & Civil Legal Information Is Not Legal Advice This site provides information about the law designed.
Identity Theft and You Identity Theft and You Updated May of 2007.
Workshop on Cyber Crime Wednesday, 18th June Hotel Bristol, M.G. Road, Gurgaon Session III- An overview of Information Technology Act; 2000 & Issues.
© 2016 SlidePlayer.com Inc. All rights reserved.