SlideShare a Scribd company logo
1 of 1
Cyber Crime and regulations
The growth of technology has changed our lives dramatically. Computers were viewed as a luxury or even
an extravagance 30 years ago. People relied on television, newspapers, and radio as primary sources of
news and information. Cables, modems, and online services were virtually nonexistent.

Today, computers are prevalent in businesses, homes, schools, libraries, and even airports. The World
Wide Web provides instant access to news, reference information, shopping, banking, stock trading,
auctions, and travel information and reservations. People routinely use the Internet to take college courses,
play games, listen to music, and view videos. Chat rooms and e-mails are now replacing telephones as
favorite means of long-distance communication.

The rise of computer technology obviously has enhanced our lives in many ways, such as enabling
improved productivity and efficiency at work, school, and home. Anyone with access to a computer and
modem now has unparalleled recreational and educational opportunities.

Unfortunately, criminals are also using modern technology—to prey on innocent victims. Computers and the
Internet have made the criminal’s job easier. Historically, predators found their victims in

...
This approach eliminates many of the risks predators face when making contact in person.

Online Pornography - possessing or distributing child pornography is against federal law and distributing
pornography of any form to a minor is illegal.

There is a huge impact on the victims of cyber stalking. In contrast, the state attorney general's offices in
neighboring states indicated they have never received an inquiry into this type of behavior. Like conventional
terrorism, `e-terrorism' is classified as such if the result of hacking is to cause violence against persons or
property, or at least cause enough harm to generate fear. This act will create a national fraud alert system
so consumers have to make just one telephone call to report fraudulent activity.

The Cyber-Crime and Intellectual Property Theft program seeks to collect and disseminate data and
research on six 'popular' categories of cyber-crime that directly impact citizens and consumers.

• The lack of adequate statutory authority also can limit law enforcement's response to cyberstalking
incidents. Hacking is also the act by which other forms of cyber-crime (e.

“Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such
as following a person, appearing at a person's home or place of business, making harassing phone calls,
leaving written messages or objects, or vandalizing a person's property. Then, one day, a regular participant
sent her a threatening e-mail. Most cyberstalking laws, however, allow for prosecution if someone receives
repeated e-mails threatening violence.

More Related Content

What's hot

Digital law
Digital lawDigital law
Digital lawmakylahh
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in TechnologyGregory Barnes
 
Digital law
Digital lawDigital law
Digital lawmyls69
 
Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paperaymancoo
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Omkar Walavalkar
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetDibussi Tande
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 

What's hot (19)

Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
Igf oecd
Igf oecdIgf oecd
Igf oecd
 
Types of Crime
 Types of Crime  Types of Crime
Types of Crime
 
Legal Issues in Technology
Legal Issues in TechnologyLegal Issues in Technology
Legal Issues in Technology
 
Digital law
Digital lawDigital law
Digital law
 
Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paper
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
An Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the InternetAn Overview of the Battle for the Control of the Internet
An Overview of the Battle for the Control of the Internet
 
Meetings and the law chicago digital age 050813
Meetings and the law   chicago digital age 050813Meetings and the law   chicago digital age 050813
Meetings and the law chicago digital age 050813
 
Definition of key words
Definition of key wordsDefinition of key words
Definition of key words
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Cyber Harassment
Cyber HarassmentCyber Harassment
Cyber Harassment
 
Washington's Privacy Tango
Washington's Privacy TangoWashington's Privacy Tango
Washington's Privacy Tango
 

Similar to Cyber crime and regulations

Similar to Cyber crime and regulations (18)

Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Stalking2
Stalking2Stalking2
Stalking2
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
A Study On The Cyber-Crime And Cyber Criminals  A Global ProblemA Study On The Cyber-Crime And Cyber Criminals  A Global Problem
A Study On The Cyber-Crime And Cyber Criminals A Global Problem
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Multimedia12 by aparajeeta
Multimedia12 by aparajeetaMultimedia12 by aparajeeta
Multimedia12 by aparajeeta
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

More from WAQAR AHMED

More from WAQAR AHMED (20)

Disney mission statement
Disney mission statementDisney mission statement
Disney mission statement
 
Dhl mission statement
Dhl mission statementDhl mission statement
Dhl mission statement
 
Denny
DennyDenny
Denny
 
Dell mission statement
Dell mission statementDell mission statement
Dell mission statement
 
Coca cola mission statement
Coca cola mission statementCoca cola mission statement
Coca cola mission statement
 
Burger king mission statement
Burger king mission statementBurger king mission statement
Burger king mission statement
 
Amazon mission statement
Amazon mission statementAmazon mission statement
Amazon mission statement
 
Google mission statement
Google mission statementGoogle mission statement
Google mission statement
 
Ibm mission statement
Ibm mission statementIbm mission statement
Ibm mission statement
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Communications
CommunicationsCommunications
Communications
 
Childrens magazines
Childrens magazinesChildrens magazines
Childrens magazines
 
13thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp0213thproceedings 120911093700-phpapp02
13thproceedings 120911093700-phpapp02
 
Ali
AliAli
Ali
 
Ch18
Ch18Ch18
Ch18
 
Ch17
Ch17Ch17
Ch17
 
Ch19
Ch19Ch19
Ch19
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch15
Ch15Ch15
Ch15
 

Cyber crime and regulations

  • 1. Cyber Crime and regulations The growth of technology has changed our lives dramatically. Computers were viewed as a luxury or even an extravagance 30 years ago. People relied on television, newspapers, and radio as primary sources of news and information. Cables, modems, and online services were virtually nonexistent. Today, computers are prevalent in businesses, homes, schools, libraries, and even airports. The World Wide Web provides instant access to news, reference information, shopping, banking, stock trading, auctions, and travel information and reservations. People routinely use the Internet to take college courses, play games, listen to music, and view videos. Chat rooms and e-mails are now replacing telephones as favorite means of long-distance communication. The rise of computer technology obviously has enhanced our lives in many ways, such as enabling improved productivity and efficiency at work, school, and home. Anyone with access to a computer and modem now has unparalleled recreational and educational opportunities. Unfortunately, criminals are also using modern technology—to prey on innocent victims. Computers and the Internet have made the criminal’s job easier. Historically, predators found their victims in ... This approach eliminates many of the risks predators face when making contact in person. Online Pornography - possessing or distributing child pornography is against federal law and distributing pornography of any form to a minor is illegal. There is a huge impact on the victims of cyber stalking. In contrast, the state attorney general's offices in neighboring states indicated they have never received an inquiry into this type of behavior. Like conventional terrorism, `e-terrorism' is classified as such if the result of hacking is to cause violence against persons or property, or at least cause enough harm to generate fear. This act will create a national fraud alert system so consumers have to make just one telephone call to report fraudulent activity. The Cyber-Crime and Intellectual Property Theft program seeks to collect and disseminate data and research on six 'popular' categories of cyber-crime that directly impact citizens and consumers. • The lack of adequate statutory authority also can limit law enforcement's response to cyberstalking incidents. Hacking is also the act by which other forms of cyber-crime (e. “Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Then, one day, a regular participant sent her a threatening e-mail. Most cyberstalking laws, however, allow for prosecution if someone receives repeated e-mails threatening violence.