Presentation is loading. Please wait.

Presentation is loading. Please wait.

6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS

Similar presentations


Presentation on theme: "6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS"— Presentation transcript:

1 6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Understand Cyber Law

2 Cyber Law Law that pertains to computer and computer-related crimes
Cybercrime – any criminal activity associated with a computer Cybertort – invasion, theft, falsification, misuse or deletion of information stored in a computer

3 Cybercrime Cyberspoofing – crime falsely adopting the identity of another computer user; creating a false identity on a website in order to commit fraud Cyberpiracy – crime that involves using a computer to steal computer data stored in a digital format Cyberblackmail – (cyberextortion) use of information unlawfully obtained by computer to pressure someone into doing something for the blackmailer

4 Cybercrime Cyberterrorism – using a computer to disrupt a part of the national electronic infrastructure Cybervandalism – disrupting, damaging, or destroying a website or computer network Cybergerm warfare – involves transmitting computer viruses to destroy computer systems or files

5 Identity Theft Identity theft – using a computer to steal financial, employment, education, medical and personal data How to report Other types Medical Identity - If an identity thief gets medical treatment using your name, the thief’s medical information – for example, blood type, test results, allergies, or illnesses – can get into your medical file. Information about the thief can be added to your medical, health insurance, and payment records.

6 Identity Theft Other types(cont.)
Child identity - When an identity theif uses a child’s personal information to commit fraud. A thief may steal and use a child’s information to get a job, government benefits, medical care, utilities, car loans, or even a mortgage. Avoiding, discovering, and recovering from child identity theft involves some unique challenges.

7 Cybertorts Invasion, theft, falsification, misuse, or deletion of information stored in a computer Cyberdefamation – communication via computer or other electronic device of false information that damages a person’s reputation Cyberinvasion of privacy – unwelcome intrusion into the private matters of an individual through the use of a computer

8 Important Statutes Computer Software Copyright Act of 1980
added software programs to the types of work protected by copyright laws Anticybersquatting Consumer Protection Act provides a shield for real owners of trademarks and trade names. Prevents people to trademark a domain name with no intention of using it Uniform Computer Information Transactions Act (UCITA) Governs law for software agreements, licenses, formulation contracts, and maintenance contracts Contracts entered into electronically will be just as binding as one negotiated outside of the Web.

9 Important Statutes Lanham Act of 1976
Provides for the registration and protection of copyrights and trademarks Trademark Dilution Act of 1996 Attempts to protect the holders of famous trademarks from the effects of domain-page registrations that tend to confuse and dilute the trademark’s goodwill Computer Fraud and Abuse Act An often-amended act that pioneered the treatment of computer-related crimes as unique offenses

10 Important Statutes Telecommunications Act of 1996
Also known as the Communications Decency Act of 1996 Makes it criminal to knowingly transport obscene material through interactive computers or interstate or foreign commerce for sale or distribution Gives protection from defamation suits to Internet service providers Child Online Protection Act of 1998 Makes it a crime for site operators to fail to use proper technology to prevent minors from accessing harmful material


Download ppt "6.00 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS"

Similar presentations


Ads by Google