cyber law lesson...cyber torts • cyber stalking – the repeated use of electronic communication...

46

Upload: others

Post on 07-Jul-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS
Page 2: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES

Page 3: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

WE WILL EXAMINE THE LAWS RELATED TO CRIMES COMMITTED WHILE USING COMPUTERS AND DEVICES CONNECTED 

TO THE INTERNET (E.G., SMARTPHONES, TABLETS). 

Page 4: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

TYPES OF CYBER CRIMES

•CYBER TRESPASSING

•CYBER SPOOFING

•CYBER PIRACY

•CYBER BLACKMAIL

•IDENTITY THEFT

•CYBER TERRORISM

•CYBER VANDALISM

•CYBER GERM WARFARE

Page 5: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER TRESPASSING

•A PERSON INTENTIONALLY AND

WITHOUT AUTHORIZATION ACCESSES,

ALTERS, DELETES, DAMAGES, DESTROYS,

OR DISRUPTS ANY COMPUTER.

Page 6: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER SPOOFING

•A FRAUDULENT OR MALICIOUS PRACTICE IN

WHICH COMMUNICATION IS SENT FROM AN

UNKNOWN SOURCE TO THE RECEIVER WITH

INTENT TO CAUSE HARM.

Page 7: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER SPOOFING

•EMAIL SPOOFING – CREATION OF EMAIL MESSAGES WITH A FORGED SENDER ADDRESS.

•PHISHING – ACTIVITY OF DEFRAUDING AN ONLINE ACCOUNT HOLDER OF FINANCIAL INFORMATION..

Page 8: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER SPOOFING

•KEYLOGGING – ALLOWS A PERSON TO TRACK KEY STROKES ON YOUR COMPUTER.

Page 9: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER SPOOFING

•SPYWARE – INSTALLED SOFTWARE TO GATHER INFORMATION ABOUT AN INTERNET USER’S BROWSING HABITS.

•HACKING – A PERSON SECRETLY GETS ACCESS TO A COMPUTER SYSTEM IN ORDER TO GET INFORMATION, OR CAUSE DAMAGE.

Page 10: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER SPOOFING•THE PERSON IS TRYING TO GET PERSONAL INFORMATION

• TO OPEN A BANK ACCOUNT IN ANOTHER’S NAME,

•PURCHASE ITEMS WITH ANOTHER’S CREDIT CARD, OR

•TAKE OUT A LOAN IN ANOTHER’S NAME.

Page 11: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER PIRACY

•ILLEGAL REPRODUCTION AND DISTRIBUTION

OF SOFTWARE APPLICATIONS, GAMES,

MOVIES AND AUDIO CDS.

•MAKING COPIES WITHOUT PERMISSION

Page 12: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER BLACKMAIL

•FORM OF BULLYING THAT IS AIMED AT

TEENS, COLLEGE STUDENTS, AND

YOUNGER CHILDREN USING WEBCAMS.

Page 13: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

IDENTITY THEFT

•THE FRAUDULENT ACQUISITION AND USE

OF A PERSON’S PRIVATE IDENTIFYING

INFORMATION.

Page 14: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER TERRORISM

•THE POLITICALLY MOTIVATED USE OF

INFORMATION TECHNOLOGY TO CAUSE

SEVERE DISRUPTION AND/OR FEAR

AMONG A SOCIETY.

Page 15: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER VANDALISM

•TO CHANGE ANOTHER’S WEBSITE WITH

MALICIOUS INTENT.

Page 16: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER GERM WARFARE

•THE ACTIVITY OF USING THE INTERNET TO

ATTACK A COUNTRY’S COMPUTERS IN

ORDER TO DAMAGE THINGS SUCH AS

COMMUNICATION AND TRANSPORTATION

SYSTEMS.

Page 17: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER FORENSICS

•THE INVESTIGATION OF LEGAL EVIDENCE

FOUND ON COMPUTERS AND OTHER

DIGITAL STORAGE DEVICES.

Page 18: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

COMPARE CYBER CRIMES AND CYBER TORTS

Page 19: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER CRIMES VS. CYBER TORTS

CYBER CRIMES

•CRIMES DIRECTED AT

PEOPLE USING COMPUTERS

AND ALSO AGAINST OTHER

COMPUTERS.

CYBER TORTS

• IS THE LEGAL TERM FOR

CYBER CRIME. A CYBER CRIME

HARMS A PARTICULAR

PERSON OR PERSONS AS A

RESULT OF THE CRIME.

Page 20: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER TORTS

•DEFAMATION – USING THE INTERNET WITH FALSE STATEMENTS THAT HARMS THE REPUTATION OF AN INDIVIDUAL, BUSINESS, PRODUCT, GROUP, GOVERNMENT, RELIGION, OR NATION.

•CYBER BULLYING – USING THE INTERNET TORMENTING, THREATENING, HARASSING, HUMILIATING, EMBARRASSING, OR OTHERWISE TARGETING INDIVIDUALS.

Page 21: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER TORTS•CYBER STALKING – THE REPEATED USE OF ELECTRONIC

COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS).

•TRESPASS OF CHATTELS – INTERFERENCE WITH ANOTHER PERSON’S LAWFUL POSSESSION OF MOVEABLE PERSONAL PROPERTY – TAKING OR USING WITHOUT PERMISSION ANOTHER PERSONS ELECTRONIC DEVICE OR SOFTWARE.

Page 22: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER TORTS

•MISREPRESENTATION OR FRAUD – USING THE INTERNET OR COMPUTER DEVICES WITH INTENT OF IMPERSONATING FOR PERSONAL OR FINANCIAL GAIN.

•CYBER INVASION OF PRIVACY – INTRUSION INTO THE PERSONAL LIFE OF ANOTHER.

Page 23: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DESCRIBE INTELLECTUAL PROPERTY RIGHTS AND

COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES

Page 24: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

INTELLECTUAL PROPERTY RIGHTS RELATED TO DIGITAL PURCHASES

•LAWS PROTECTING THE CREATION OF ORIGINAL WORK (MUSIC, LITERATURE, AND ARTISTIC WORKS, DISCOVERIES AND INVENTIONS, COPYRIGHTS, TRADEMARKS, PATENTS, INDUSTRIAL DESIGN RIGHTS, TRADE DRESS, AND TRADE SECRETS.

Page 25: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES

•A FORM OF PROTECTION PROVIDED TO AUTHORS OF “ORIGINAL WORKS OF AUTHORSHIP” THAT INCLUDES LITERARY, DRAMATIC, MUSICAL, ARTISTIC AND CERTAIN OTHER CREATIVE WORKS.

Page 26: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

HOW DOES THE RIGHTS AND LAWS DIFFER FOR DIGITAL PURCHASES?

•PURCHASES MADE USING TECHNOLOGY

IS PERMANENT AND CAN NOT BE

DELETED.

Page 27: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DESCRIBE LAWS RELATED TO E‐COMMERCE.

Page 28: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

E‐COMMERCE.

•IS THE TRADING IN PRODUCTS OR

SERVICES USING A COMPUTER

NETWORK.

Page 29: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DIGITAL SIGNATURES

•IS AN ELECTRONIC RATHER THAN A WRITTEN

SIGNATURE THAT CAN BE USED BY

SOMEONE TO AUTHENTICATE THE IDENTITY

OF THE SENDER OF A MESSAGE OR OF THE

SIGNER OF A DOCUMENT.

Page 30: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

THE E-SIGN ACT

•A US FEDERAL LAW PASSED BY THE US CONGRESS

TO FACILITATE THE USE OF ELECTRONIC RECORDS

AND ELECTRONIC SIGNATURES IN INTERSTATE AND

FOREIGN COMMERCE BY ENSURING THE VALIDITY

AND LEGAL EFFECT OF CONTRACTS ENTERED INTO

ELECTRONICALLY.

Page 31: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

JURISDICTIONAL ISSUES OF BUYING PRODUCTS ONLINE FROM DIFFERENT STATES.

•COMPANIES CAN EASILY SELL TO CONSUMERS ANYWHERE IN THE WORLD WITH NO PHYSICAL PRESENCE IN ANY OF THE LOCATIONS. AND SO FAR, REGULATIONS AND LAW ARE A BIT MURKY. FUNDAMENTALLY, LEGAL EXPERTS SAY, FOR A COURT TO EXERCISE JURISDICTION OVER A WEB SITE, IT MUST DETERMINE IF CERTAIN CONSTITUTIONAL LIMITS OF DUE PROCESS ARE SATISFIED. IN ORDER TO DO THIS, A SITE HAS TO HAVE SOME PRESENCE IN THE STATE. - SEE MORE AT: HTTP://WWW.KLCPAS.COM/SORT-OUT-THE-JURISDICTIONAL-ISSUES-OF-E-COMMERCE/#STHASH.KLPE7VRF.DPUF

Page 32: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY 

AFFECTS A CONTRACT.

Page 33: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY AFFECTS A CONTRACT.

•TECHNOLOGY ALLOWS US TO BE

CONNECTED WORLD WIDE AND ALLOWS

CONTRACTS AND PURCHASES TO BE

COMPLETED MUCH FASTER.

Page 34: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY 

AFFECT THE DIFFERENT AREAS OF LAW

Page 35: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DUE TO ADVANCES IN TECHNOLOGY AND THE INTERNET

•THE AMOUNT OF CRIMES RELATED TO

INTELLECTUAL PROPERTY HAS INCREASED.

•HOWEVER, TECHNOLOGY CAN HELP SOLVE

CASES.

Page 36: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

ADVANCES IN TECHNOLOGY

•PROMOTES CONSIST LAWS FOR

INTELLECTUAL PROPERTY, CONTRACTS,

CRIMES, TORTS/CIVIL MATTERS, AS WELL

AS INTERNATIONAL BUSINESS.

Page 37: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY AFFECT THE DIFFERENT AREAS OF LAW•TECHNOLOGY HELPS REACH A LARGER NUMBER OF PEOPLE

•TECHNOLOGY INCREASES THE SPEED OF WHICH WE CAN EXECUTE CONTRACTS.

•HOWEVER, LAWS NEED TO BE RE-EVALUATED CONSTANTLY DUE TO TECHNOLOGY ADVANCES.

Page 38: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DESCRIBE THE VARIOUS TYPES OF FEDERAL AND STATE STATUTES DESIGNED TO

COMBAT COMPUTER CRIME.

Page 39: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

ELECTRONIC COMMUNICATIONS PRIVACY ACT

•A US FEDERAL STATUTE THAT PROHIBITS

A THIRD PARTY FROM INTERCEPTING OR

DISCLOSING COMMUNICATIONS

WITHOUT AUTHORIZATION.

Page 40: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

CYBER SECURITY ENHANCEMENT ACT

•INCREASES THE SECURITY OF FEDERAL NETWORKS

AND INFORMATION SYSTEMS, IMPROVES THE

TRANSFER OF CYBERSECURITY TECHNOLOGIES TO

THE MARKETPLACE, TRAIN A CYBERSECURITY

WORKFORCE, AND COORDINATES AND

PRIORITIZE FEDERAL CYBERSECURITY RESEARCH

AND DEVELOPMENT EFFORTS.

Page 41: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DIGITAL MILLENNIUM COPYRIGHT ACT

•A 1998 US LAW INTENDED TO UPDATE

COPYRIGHT LAW FOR ELECTRONIC

COMMERCE AND ELECTRONIC CONTENT

PROVIDERS. IT CRIMINALIZES THE

CIRCUMVENTION OF ELECTRONIC AND

DIGITAL COPYRIGHT PROTECTION SYSTEMS.

Page 42: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

ECONOMIC ESPIONAGE ACT

•DEFINES THE TERM “ECONOMIC ESPIONAGE” AS THE THEFT OR MISAPPROPRIATION OF A TRADE SECRET WITH THE INTENT OR KNOWLEDGE THAT THE OFFENSE WILL BENEFIT ANY FOREIGN GOVERNMENT, FOREIGN INSTRUMENTALITY, OR FOREIGN AGENT.

Page 43: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

FRAUDULENT ONLINE IDENTITY SANCTIONS ACT (FOISA)

•MAKES IT A VIOLATION OF TRADEMARK AND COPYRIGHT LAW IF A PERSON KNOWINGLY PROVIDED, OR CAUSED TO BE PROVIDED, MATERIALLY FALSE CONTACT INFORMATION IN MAKING, MAINTAINING, OR RENEWING THE REGISTRATION OF A DOMAIN NAME USED IN CONNECTION WITH THE VIOLATION.

Page 44: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

COMPUTER SOFTWARE PRIVACY AND CONTROL ACT (CSPCA)

•TO PREVENT DECEPTIVE SOFTWARE

TRANSMISSION PRACTICES IN ORDER TO

SAFEGUARD COMPUTER PRIVACY,

MAINTAIN COMPUTER CONTROL, AND

PROTECT INTERNET COMMERCE.

Page 45: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

DESCRIBE THE RAMIFICATIONS OF IMPROPER USE OF BUSINESS TECHNOLOGY AND PROPERTY

Page 46: Cyber Law Lesson...CYBER TORTS • CYBER STALKING – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO HARASS OR FRIGHTEN SOMEONE (E.G., THREATENING E-MAILS). • TRESPASS OF CHATTELS

WHAT ARE THE CONSEQUENCES FROM USING BUSINESS TECHNOLOGY FOR PERSONAL USE?

•KNOW THE RULES AND REGULATIONS AT

WORK

•EMPLOYEES CAN BE FIRED FOR IMPROPER

USE