Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.

Similar presentations


Presentation on theme: "Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II."— Presentation transcript:

1 Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II

2  Cyberlaw– the area of law which concerns computers and computer- related crimes  Cybercrime—any criminal activity associated with a computer DEVELOPMENT OF CYBERLAW

3 1.Cybertresspass Approach (or computer tresspass)  Any illegal activity already in the criminal code committed by using a computer 2.Rewriting of Criminal Code  Some states have written statutes for every crime that can possibly be committed by using a computer  This is difficult since each new statute must be individually created by state legislature TWO APPROACHES TO DEVELOP CYBERLAW:

4 1.Cyberspoofing: When a user creates a false identity or adopts an identity of another user while using computer to commit fraud (Phishing)  False emails, false websites  They attempt to lure people and obtain personal information of their victims 2.Cyberpiracy: Using a computer to steal data stored in digital format (intellectual property theft) CYBERCRIMES

5 3. Cyberblackmail: Use of data unlawfully obtained by computer to pressure victim into granting payoff  Users who spend time in chat rooms are vulnerable  Cyberblackmaler often befriends a person, learns damaging information, then uses it to extort money CYBERCRIMES CONT.

6 4.Identity Theft—using computer to steal financial, employment, educational, medical, and personal information  Attempt to obtain credit card numbers, PINS, SSN, access codes, etc.  Use the data to empty bank accounts, run up credit card bill, steal cash, and disrupt personal life. 5.Cyberterrorism—using computer person interrupts national infrastructure  Powergrids, air traffic control system, and the national defense CYBERCRIMES CONT.

7 4.Cybervandalism—disrupting, damaging, or destroying web site or computer network  Hackers- usually done for revenge or to attack a business 5.Cybergerm Warfare—transmit computer virus to destroy others computer files/systems  Firewalls and anti-virus software can sometimes block many viruses CYBERCRIMES CONT.

8 Definition—invasion, theft, falsification, misuse or deletion of data stored in computer to commit a crime 1.Cyberdefamation—communication via computer or other electronic device of false data to damage person’s reputation 2.Cyberinvasion of Privacy—unwelcome intrusion into private matters of another carried out or sustained by computer CYBERTORTS

9 What crime involved using a computer to obtain a payoff? What crime involved disrupting infrastructure? What crime involves using a computer to steal financial, employment, or personal information? CYBER ASSESS


Download ppt "Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II."

Similar presentations


Ads by Google