Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Criminal Law Chapter 5.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Technology: Unethical Behavior and Its Consequences Prepared by Tami Genry March 2004.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
THEFT AND EMBEZZLEMENT M. Reid California Criminal Law Concepts Chapter 16 1.
Cyber Law & Islamic Ethics CICT3523 COMPUTER CRIMES.
Chapter 8 Crimes Twomey, Business Law and the Regulatory Environment (14th Ed.)
Crimes Against Property 1.Grab an iPad 2. Tap on the Big L app 3. Log into the blog (log-ins) 4. Answer the Crimes Against Property Questions.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
Chapter 7 Crimes Against Property. Common-Law Background It was a very serious offense for someone to permanently deprive another of the possession of.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
What You’ll Learn How to define major crimes against people (p. 62)
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Hazards of Hacking. Hacking Originally, hacking was used to describe a programmer who was very skilled at his/her profession Often, this person knew programming.
Security, Privacy, and Ethics Online Computer Crimes.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
Legal and Ethical Issues This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material.
General Awareness Training
Acceptable Use Policy.  To promote educational excellence in our district by facilitating resource sharing, innovation, and communication for parents,
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Quick! What is a crime?. So, just how much has to be proven in court to find someone guilty of a crime? Burden of Proof The prosecution has the burden.
U.S. Copyright Enforcement Benjamin Hardman Attorney / Advisor Office of Intellectual Property Policy & Enforcement, USPTO.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Particular Crimes Section 3.2.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Chapter 10: Crimes Against Property
CHAPTER FIVE CRIMINAL LAW MUSOLINOSUNY CRIMINAL & BUSINESS LAW.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Chapter 9 Enhancing Information/Computer Security.
Chapter 5 Our Criminal Laws Lesson 5-1 Criminal Law.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Particular Crimes Section 3.2.
Chapter 5 Our Criminal Laws
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Crimes Against Property Two subgroups: 1.Crimes in which property is destroyed 2.Crimes in which the property is stolen or taken against the will of the.
Essentials Of Business Law Chapter 3 Criminal Law Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Section 2.1 Crimes and Criminal Justice Section 2.1 Crimes and Criminal Justice A crime is an act that violates the rules of society, or the law.
Internet Safety Internet Safety LPM
CRIMES Used by permission. For Educational purposes only.
Drill: Why might this be considered a crime?
Chapter 3 Criminal Law. Crime: An act against the public good.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Law 12 MUNDY Historically, property crimes (theft, etc.) were considered so serious that the death penalty was applied 2/3 of all crimes in Code.
3Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Particular Crimes Section 3.2.
Chapter 3 Section 2 Particular Crimes. Crimes Against People Murder –First Degree(premeditation, while committing a felony) –Second Degree Manslaughter(accidental)
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Virginia RULES Teens Learn & Live the Law Property Crimes.
Law for Business and Personal Use © Thomson South-Western CHAPTER 4 Criminal Law and Procedure 4-1 Criminal Law 4-2 Criminal Procedure.
Property Crimes.
18 USC § 1030 Computer Fraud and Abuse Act
Crimes Against Property
Crimes against Property
Update on the Computer Fraud and Abuse Act
Section 3.2.
What is a good definition of crime?
Forensic and Investigative Accounting
Section Outline Crimes Against People Murder Manslaughter
Presentation transcript:

Copyright 2000, Marchany Computer Law Threats and Issues VA Computer Crime Act Randy Marchany VA Tech Computing Center ©Marchany,2001

Copyright 2000, Marchany VA Computer Crimes Act  Enacted in 1994  Fairly comprehensive  Key conditions - “permission” – If you have permission to use or access a resource then it’s ok

Copyright 2000, Marchany Definitions  Computer – Includes any connected or directly related device, equipment or facility which enables the computer to store, retrieve or communicate computer programs, data or the results of computer operations to/from a person, another computer or another device

Copyright 2000, Marchany Definitions  Computer Data – Any representation of information, knowledge, fact, concepts or instructions which is being prepared, has been prepared and is intended to be processed, is being processed or has been processed in a computer or computer network.

Copyright 2000, Marchany Definitions  Computer Network – A set of related, remotely connected devices and any communications facilities including more than 1 computer with the capability to transmit data among them through the communications facilities.

Copyright 2000, Marchany Definitions  Computer Operation – Arithmetic, logical, monitoring, storage or retrieval functions (any combination thereof), includes but not limited to, communication with storage or retrieval of data from any device.

Copyright 2000, Marchany Definitions  Computer Program – Ordered set of data representing coded instructions/statements that when executed by a computer causes it to perform 1 or more operations.

Copyright 2000, Marchany Definitions  Electronic Mail Service Provider – Means any person who 1) is an intermediary in sending/receiving electronic mail and 2) provides to end-users of electronic mail services the ability to send/receive electronic mail.  Financial Instrument – Check, draft, warrant, money order, note, letter of credit, etc.

Copyright 2000, Marchany Definitions  Owner – Owner, lessee of a computer, network, data, programs or software  Person – Any individual, partnership, association, corp.  Property – Computer, networks, programs, data in a format readable by computer

Copyright 2000, Marchany Definitions  Using a computer. A person attempts: – To cause or causes a computer/network to perform or stop performing operations. – To cause or causes the withholding or denial of the use of a computer/network/program/data to another user. – To cause or causes another person to put false information in a computer.

Copyright 2000, Marchany Definitions  A person is “without authority” – He has no right or permission of the owner to use a computer or he uses a computer in a manner exceeding such right/permission. – He uses a computer/network/ provider to transmit unsolicited bulk in a manner contrary to the policies of the owner.

Copyright 2000, Marchany Computer Fraud  Any person who uses a computer/network w/o authority and with the intent to: – Obtain property or services by false pretenses, embezzle or commit larceny or – Convert the property of another  Value >=$200, Class 5 felony  Value <= $200, Class 1 misdemeanor.

Copyright 2000, Marchany Computer Trespass  Any person who uses a computer, network w/o authority and with the intent  To temporarily or permanently remove, halt or disable any computer data, programs, software from a computer/network.  To cause a computer to malfunction regardless of how long.

Copyright 2000, Marchany Computer Trespass  Alter, erase any computer data, software;  Effect the creation or alteration of a financial instrument or an electronic transfer of funds;

Copyright 2000, Marchany Computer Trespass  Cause physical injury to the property of another;  Make or cause to be made an unauthorized copy in any form of data/software.

Copyright 2000, Marchany Computer Trespass  The “hacker site” clause – Unlawful for any person knowingly to sell, give, distribute, possess with the intent to sell, give or distribute software designed to facilitate, or enable the falsification of transmission or routing information.  Falsify or forge transmission or other routing information in connection with unsolicited bulk mail.

Copyright 2000, Marchany Computer Trespass  Class 3 misdemeanor  If property damage > $2500, then Class 1 misdemeanor if the person has reckless disregard for the consequences of his actions.  If property damage > $2500 then Class 6 felony is the person maliciously causes damage.

Copyright 2000, Marchany Theft of Computer Services  Any person who willfully uses a computer/network with the intent to obtain computer services without authority  Class 1 misdemeanor

Copyright 2000, Marchany Property Capable of Embezzlement  Computer or computer networks  Financial instruments, computer data, programs  Computer services

Copyright 2000, Marchany Property Capable of Embezzlement  Regardless of whether they’re tangible or intangible, in a format readable by humans or computer, in transit between computers or within a network or between any devices that comprise a computer.  Located on any paper or in any device on which it is stored by a computer or by a human

Copyright 2000, Marchany Prosecution Venues  Any county, city where the act occurred  In which the owner has his principal place of business in the Commonwealth  In which any offender had control or possession of any proceeds of the violation  From which to which or through which any access to computer/network was made via wires, microwaves, electromagnetic waves

Copyright 2000, Marchany Prosecution Venues  In which the offender lives  In which any computer which is an object or an instrument of the violation is located at the time of the offense.

Copyright 2000, Marchany Limitation of Prosecution  5 years after the commission of the last violation  1 year after the existence of the illegal act and the identity of the offender are discovered by the Commonwealth, by the owner or by anyone else who is damaged by such violation.

Copyright 2000, Marchany Discussion  Key clause is the “without authority”  Computer Trespass is probably the most common offense.  This clause covers most hacker activity  Is the evidence there to prosecute? Criminal justice is much harder to prove than Civil justice.