BUSINESS LAW TODAY Essentials ninth Ed. Roger LeRoy Miller - Institute for University Studies, Arlington, Texas Gaylord

1786 days ago, 736 views
PowerPoint PPT Presentation
2. Learning Objectives. What recognizes digital wrongdoing from

Presentation Transcript

Slide 1

Digital Crime Chapter 7 BUSINESS LAW TODAY Essentials 9 th Ed. Roger LeRoy Miller - Institute for University Studies, Arlington, Texas Gaylord A. Jentz - University of Texas at Austin, Emeritus

Slide 2

Learning Objectives What recognizes digital wrongdoing from "conventional" wrongdoing? How has the web extended open doors for data fraud? What are three reasons that cyberstalking might be more ordinary than physical stalking? What are three noteworthy reasons the web is helpful for adolescent digital wrongdoing? How do encryption programs shield computerized information from unapproved get to?

Slide 3

Computer Crime and the Internet Computer Crime: infringement of criminal law that includes "information of PC innovation for its execution, examination, or arraignment." Three Categories: Computer is question of a wrongdoing. PC is subject of a wrongdoing. PC is the instrument of a wrongdoing.

Slide 4

Cyber Crimes Against Persons and Property Cyber Computer Fraud. Convince casualties to burn through cash on different tricks (Nigerian financial balances, medical coverage, travel). Online Auction Fraud. Online Retail Fraud.

Slide 5

Cyber Crimes : Cyber Theft Cyber Theft. Wholesale fraud utilizing novel strategies. Minimal effort of underground market information. "Phishing." Vishing. Work Fraud.

Slide 6

Cyberstalking California passed first antistalking law in 1990. Today 48 states have cyberstalking laws. Danger of Cyberstalking. Ex-darlings utilizing spyware to screen keystrokes. Cyberstalking on Social Networks. CASE 7.1 State v. Kline (2008). District where casualty dwells is fitting setting for arraignment of cyberstalking wrongdoings.

Slide 7

Cyber Crimes in the Business World Credit Card Crime on the Web. Organizations go out on a limb in putting away clients private data on the web. Programmers. Botnets, malware, infections, and worms can send data from your PC to outsider systems. Adolescent Cyber Crime is a developing risk.

Slide 8

Cyber Crimes in the Business World Hacking and Cyberterrorism. Cyberterrorists are stealth programmers attempting to adventure PCs for most extreme effect. Rationale bombs may "detonate" PCs and online systems. 2009 – Chinese and Russians hacked into our electrical power matrix, deserting "botnet" programming that could capture offices. Pilfering Intellectual Property Online.

Slide 9

Spread of Spam: spontaneous "garbage" messages with advertisements, sales, and different messages. State Regulation of Spam. Government CAN-SPAM Act. U.S. Safe Web Act. Permits FTC to impart data to remote offices researching and indicting digital wrongdoings. Furnishes ISP's with resistance from obligation for providing supporter data to FTC.

Slide 10

Cyber Crimes Against the Community – Gambling in Cyberspace Legal Confusion over Online Gambling. Will natives of a state in which betting is unlawful, put down wagers at online gambling clubs situated in another state — or nation? CASE 7.2 United States v. $6,976,934.65, Plus Interest Deposited into Royal Bank of Scotland International (2009). Prosecutions were adequately "related" to the common relinquishment to apply the criminal disentitlement statute. Congress Takes Action. Unlawful Internet Gambling Enforcement Act of 2006.

Slide 11

Fighting Cyber Crime Prosecuting Cyber Crimes. Edge inquiries of ward and setting. Distinguishing proof of transgressors is troublesome on the grounds that they don't leave fingerprints or DNA. PC Fraud and Abuse Act. Private Efforts to Combat Cyber Crime. Encryption is a decent, modest security gadget. Requires a private and open "key."