Online Impersonation Using somebody else's name or likeness to create a website or social networking account, or sending e-mails, text messages or instant.

Slides:



Advertisements
Similar presentations
Developed by Technology Services 1:1 Laptop Initiative
Advertisements

U.S. Government: Law. Amendments The 5 th, 6 th, and 7 th Amendments are commonly referred to as rights of the accused The 5 th, 6 th, and 7 th Amendments.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Forms of Cyberbullying
14Cyberstalking Dr. John P. Abraham Professor University of Texas Pan American.
Understanding the impact technology has on you.. Sexting-The act of sending sexually explicit messages or photographs, primarily between mobile phones.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
Types of Laws video video CRIMINAL LAW CIVIL LAW.
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
The Internet is Forever
Youth and the Law Vocabulary #5 1. Majority- The age at which a person is 1. Majority- The age at which a person is legally considered an adult. legally.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Harsher Punishments for Cyberbullies By: Janeca Latore Section 001.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Healthy Relationships
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
By Kenrick 8B2. * Cyberbullying is defined in legal glossaries as * actions that use information and communication technologies to support deliberate,
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
By: Sophia Dermouche & Maheen Khalid
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Categories of law Civil-private wrong Criminal-public wrong.
E-safety for Teachers Friday 2nd July John Smith EPICT Candidate Teacher.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
YOUTH AND TECHNOLOGY KNOWING WHAT’S COOL & PROMOTING RESPONSIBLE USE.
Unethical use of Computers and Networks
Chapter 11 SENTENCING AND SANCTIONS 1. Purpose of Criminal Sanctions  Criminal Sanctions – A penalty imposed for violating accepted social norms. A sanction.
Chapter 28-2: Texas Judicial Branch and Courts Systems
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Stalking Awareness And Prevention Francis A. Arenas, Esq.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Dating Violence Creating a Dating Safety Plan.  Teens in abusive relationships have options for increasing their safety. They may decide to stay with.
Crimes Against Property Two subgroups: 1.Crimes in which property is destroyed 2.Crimes in which the property is stolen or taken against the will of the.
COMPUTER SOLUTIONS 1 **Notes from DVD: I Was Cyberbullied.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
Online Safety and Privacy Understanding online privacy and how your information is shared.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Copyright © 2012 Knowledge Point digital world architecture of evolution Resources:
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
Chapter 28-2: Texas Courts Systems Guided Notes. Texas Judicial System A. Consists of : 1)Courts 2)Judges 3)Law enforcement agencies B. Serves the purposes.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
CYBERBULLYING Bullying that takes place using electronic technology Bullying that takes place using electronic technology. Is an issue that need to be.
Virginia RULES Teens Learn & Live the Law Crimes Against Persons.
Section Outline 1 of 7 Laws and Our Society Section 3: Kinds of Laws I.Criminal Law II.Civil Law III.Where Criminal and Civil Law Meet Section Reading.
1. Block the bully's access to your online accounts Perhaps the easiest way to stop cyber bullies is to block the bully's access to your online accounts.
Computer Ethics and Research
Lesson 3: Cyberbullying
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Crimes Against Persons
Freedom Independence Transition
Chapter 3: Defining & Measuring Crime
What Is Bullying? Bullying is defined as the repetitive, intentional hurting of one person or group by another person or group where the relationship.
Issues In media studies: Cyberbullying
Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Safeguarding your child in the digital world
Harmful Digital Communications Act 2015 URLs
Issues With Internet in College
INTERNET SAFETY.
Chapter 15 Section 2 Chapter 16 Sections 1 and 2
Texas Judicial System Consists of : Courts Judges
Legal Classifications
are presumed innocent until proven guilty”
SmartLaw Cyberbullying.
Presentation transcript:

Online Impersonation Using somebody else's name or likeness to create a website or social networking account, or sending s, text messages or instant messages using their identity Already illegal in Texas, Mississippi, Hawaii, New York and California Laws may soon be passed in Rhode Island, Washington and New Jersey

California's SB 1411 “This bill would provide that any person who knowingly and without consent credibly impersonates another actual person through or on an Internet Web site or by other electronic means, as specified, for purposes of harming, intimidating, threatening, or defrauding another person is guilty of a misdemeanor. The bill would, in addition to the specified criminal penalties, authorize a person who suffers damage or loss to bring a civil action against any person who violates that provision, as specified.” (d) A violation of subdivision (a) is punishable by a fine not exceeding one thousand dollars ($1,000), or by imprisonment in a county jail not exceeding one year, or by both that fine and imprisonment.

Arguments for the law In theory, anybody can impersonate celebrities, politicians, and private citizens like you or me, for fraud or mischief Romney campaign created “parody” Twitter accounts for VP Biden, DNC Chairman Debbie Wasserman-Schultz Jebidiah Stipe impersonated his ex girlfriend on craigslist “personals” and gave out her information over , resulting in her rape at gunpoint Daven Lee Nielsen created fake Twitter accounts to slander the reputation of a woman he had dated and her daughters

Arguments against the law It's difficult to verify the identity of the creator of an account. More personal information would have to be provided more often. (and would be vulnerable to abuse) When the internet is used as a tool for fraud, harassment, or other crimes, the perpetrator can be prosecuted for those crimes already without adding a separate crime.

Group 10 George LaValle Deandrea Campbell