OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Class Name, Instructor Name Date, Semester Criminal Justice 2011 Chapter 14: SPECIAL INVESTIGATIONS: Vice, White-Collar, Computer, and Hit-and-Run Crimes.
Privacy and Information Security Training ( ) VUMC Privacy Website
Confidentiality and HIPAA
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Faking It: Calculating Loss in Computer Crime Sentencing Jennifer S. Granick, Esq. Stanford Law School Center for Internet and Society
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Nigel, Lochie, Anika and Martin. As the internet is becoming the most popular area of crime, countries around the world are struggling to update the law.
Security, Privacy, and Ethics Online Computer Crimes.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Chapter 1 Introduction to Security
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
TYPES OF VIOLENT CRIMES Miscellaneous. Copyright © Texas Education Agency All rights reserved. Images and other multimedia content used with permission.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
General Awareness Training
Spam and The Computer Fraud and Abuse Act Richard Warner.
HIPAA PRIVACY AND SECURITY AWARENESS.
Toward An Ethical World... Responsible Internet Citizenship: Safety, Security, & Scholarship Rodney J. Petersen Policy Analyst and Security Task Force.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
CYBER CRIME.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Computer Security Management: Assessment and Forensics Session 8.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Chapter 9 Enhancing Information/Computer Security.
What’s New 2015 Virginia’s Sentencing Guidelines.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Note1 (Admi1) Overview of administering security.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Fraud and Abuse Act Richard Warner. Liability under the CFAA  1030(a)(2)(C) imposes liability on whoever “intentionally accesses a computer.
Get Safe Online Expert advice for everyone In association with.
CRIMES Used by permission. For Educational purposes only.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Information Security and Privacy in HRIS
18 USC § 1030 Computer Fraud and Abuse Act
Hacking: public policy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
BULLYING AND MORE Presented by Dana Rahman Assistant District Attorney
Update on the Computer Fraud and Abuse Act
Forensic and Investigative Accounting
Laws Against Computer Hacking
Presentation transcript:

OVERVIEW OF COMPUTER CRIME LEGISLATION IN HAWAII CHRISTOPHER D.W. YOUNG Deputy Attorney General Financial Investigations Unit (808)586-1160 cdwy@yahoo.com DO NOT COPY OR REPRODUCED INFORMATION CONTAINED IN THIS PRESENTATION WITHOUT PRIOR WRITTEN CONSENT OF THE AUTHOR!

Why should you be concerned about cyber-crime?

INTERNET ACCESS 95% of schools and 50% of all classrooms have Internet access There are now over 300 million Internet users, over 140 million in the USA alone Consider how quick growth: 1994- 1 million users 1998 – 100 million users 2000 – 300 million users 2009 – 1.9 billion users 50% of US households are online

WEB SITES # of web sites 1993 = 5,000 web sites 2000 = 1+ billion web sites 2001 = 3+ billion web sites

E-MAIL Most popular online activity Used by 85% of homes connected to Internet 333.5 million e-mail accounts E-mail messages sent: 1994 = 777 million 1997 = 618 billion 1998 = 2.6 trillion 1999 = 5.3 trillion 2000 = 6.8 trillion

ISP – AMERICA ONLINE 23 million US members 3 million International members 1,602,000 Simultaneous Users 120 million e-mails sent per day 173 million e-mails received per day 6 billion web hits per day 245 million stock quotes per day

B2B Online Sales Will grow faster than online retail sales Billions spent each year: 1998 = $5.1 billion 2000 = $12 billion 2002 = $327 billion

CSI/FBI 2000 COMPUTER CRIME AND SECURITY SURVEY 643 Responses – 273 organizations reported $265,589,000.00 in financial losses (proprietary info./financial fraud). 90% detected computer security breaches; 70 % reported serious breaches – viruses, laptop theft, net abuse; 74% acknowledged financial losses

Internet Fraud Complaint Center Between May 8 & Sept. 27, 2000, 15,295 complaints within the US Average of $700 loss Total losses: $10,706,500 Auction fraud (48%) tops the list of frauds

THE COMPUTER HAS BECOME THE TOOL OF CHOICE FOR THE NEW MILLENNIUM What must we do to protect the resources of our organizations? Awareness (education and training); Update Legislation to address new problems created by new technology; and Impose criminal sanctions

Awareness Signed/Specific user agreements Majority of intrusions/damage come from an insider! Update security measures regularly Routine back-ups Hold people accountable Create paper trail!

Updated Legislation HB 425 – 1st revision in 10 years Makes following acts criminal:

Computer Fraud 1: Knowingly, w/intent to defraud, access computer without authorization and obtain control over property of another (B FELONY) Defense: object of fraud and property obtained consists only of the use the computer, value <$300 in one year.

Computer Fraud 2 Knowingly, w/intent to defraud, transfers or disposes to another any password or similar information (C FELONY)

Computer Damage 1 Knowingly, Causes the transmission of a program, information, code or command, Thereby knowingly causes unauthorized computer damage to a computer, system or network OR Intentionally, Accesses a computer, system or network, Without authorization, And thereby knowingly causes damage. (B FELEONY)

Damage = loss aggregating at least $5000 in any one year period Modification or impairment of medical record Result in physical injury Threaten public health safety Impair the administration of justice.

Computer Damage 2 Knowingly, access computer, without authorization and recklessly causes damage. (C FELONY) Damage = any impairment to the integrity or availability of data, program, system, network, or computer services.

Use of Computer in the Commission of a Separate Felony Knowingly, Uses a computer to, Identify, select, solicit, persuade, coerce, entice, induce, or procure the victim or intended victim of Custodial interference, sexual assault, child abuse, child pornography (one class or grade higher than offense)

FORFEITURE OF PROPERTY

JURISDICTION A person who causes, by any means, the access of a computer, system, or network in one jurisdiction from another jurisdiction is deemed to personally accessed the computer, system or network in each jurisdiction.

Unauthorized Computer Access 1 Knowingly, Accesses a computer, system or network, Without authorization, Obtains information and Offense committed for purpose of financial gain, or Value of information <$5000, or Statute or rule protects against unauthorized disclosure (B FELONY)

Unauthorized Computer Access 2 Knowingly, Accesses a computer, system or network, Without authorization, and Obtains information (C FELONY)

Unauthorized Computer Access 3 Knowingly, Accesses a computer, system or network, Without authorization (Misdemeanor)

Statute of Limitations Felony = 3 years 5 years after it is committed.

Commission on Computer Crimes Laws First meeting by Sept. 1, 2001 Report due 2003 session.

Successful Prosecution Prompt reporting Electronic/Paper trail Banner warnings Signed and updated user agreements Document losses

Deputy Attorney General Financial Investigations Unit CHRISTOPHER D.W. YOUNG Deputy Attorney General Financial Investigations Unit (808)586-1160 cdwy@yahoo.com