Hacking: public policy

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Hacker Ethics Kim Bissett Sabrina Short. Hacker Ethic: In General  Freedom of Information The web is not physical; it couldn’t be interpreted as property,
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII
Nicholas Beckworth Annie Billings Steven Blair Nimmida Kulwattanasopon Thomas Wootten.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Spam and The Computer Fraud and Abuse Act Richard Warner.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Risk Assessment. InfoSec and Legal Aspects Risk assessment Laws governing InfoSec Privacy.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
October 18, 2005 Robert S. Brown UW Medical Center Identity Theft So, what you gonna do about it?
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
CHAPTER FIVE CRIMINAL LAW MUSOLINOSUNY CRIMINAL & BUSINESS LAW.
Chapter 9 Enhancing Information/Computer Security.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Computer crimes.
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Security Debate Why cracking should be criminalized.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Privacy, Confidentiality, and the Best Interest of the State Richard Pearce-Moses Director of Digital Government Information Arizona State Library, Archives.
CHAPTER Computer Crime: Pornography, Fraud, Hacking, and Gambling Computer Crime: Pornography, Fraud, Hacking, and Gambling 22.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Bellwork Think about this…. Historical Event
18 USC § 1030 Computer Fraud and Abuse Act
Elder Abuse Reporting ORS
Crimes Against Persons
A Project on CYBER SECURITY
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Business Law Essential Standard 1.00 Objective 1.01
Update on the Computer Fraud and Abuse Act
Knowingly access without authorization
LifeBridge Health Sinai Hospital Orientation.
A Gift of Fire Third edition Sara Baase
Computer Systems D Stainton.
CompTIA Security+ Study Guide (SY0-401)
Preventing Information Technology Crimes
Business Law Essential Standard 1.00 Objective 1.01
Business Law Essential Standard 1.00 Objective 1.01
School Searches and You
End User Support By Dominique Stainton.
Laws Against Computer Hacking
Presentation transcript:

Hacking: public policy (An unrealistic depiction of a hacker) (A, most likely, more accurate depiction of a hacker) Everyone has some idea of what a hacker is in their mind. Most interpretations come from movies. Whether this is an accurate portrayal or not is another matter, most all pop culture depicts hacking as illegal. Which is true. However, what do the laws actually say? One of the biggest pieces of legislation on hacking is the Computer Fraud and Abuse Act (CFAA for short). The CFAA was enacted in 1986 for the purposes of amending existing computer fraud law. It has been amended a number of times. Most recently in 2008 by the Identity Theft Enforcement and Restitution Act. Criminal acts under the act include: (1) having knowingly accessed a computer without authorization or exceeding authorized access. (2) intentionally accesses a computer without authorization or exceeds authorized access., and thereby obtains— (A) information contained in a financial record of a financial institution, or of a card issuer. (B) information from any department or agency of the United States; or (C) information from any protected computer; (3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States; (4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period; (5) (A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer; (B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or (C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss. (6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization. Hacking in many cases is looked at as good and bad. Many agencies using hacking to find criminals or terrorists. However we still have laws against hacking in order to prevent crimes such as identity theft. There is a thin line between “good” and “bad” hacking. One such example is the surveillance that the NSA has been found to be doing. Many people were in an uproar over this invasion of privacy, however if this surveillance was found to prevent further terrorist attacks many would view that as “worth it”.

Works Cited http://www.hackerlaw.org/?page_id=55 https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act http://dailycaller.com/2015/09/04/nobody-should-feel-bad-for- people-caught-in-the-ashley-madison-hack/