Presentation is loading. Please wait.

Presentation is loading. Please wait.

EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.

Similar presentations


Presentation on theme: "EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES."— Presentation transcript:

1 EXAMINING CYBER/COMPUTER LAW BUSINESS LAW

2 EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES

3 WE WILL EXAMINE THE LAWS RELATED TO CRIMES COMMITTED WHILE USING COMPUTERS AND DEVICES CONNECTED TO THE INTERNET (E.G., SMARTPHONES, TABLETS).

4 TYPES OF CYBER CRIMES __________________ __________________ _

5 CYBER TRESPASSING A PERSON INTENTIONALLY AND WITHOUT AUTHORIZATION _______, ______, _______, _________, _________, OR __________ ANY COMPUTER.

6 CYBER SPOOFING A ___________ OR ___________ PRACTICE IN WHICH COMMUNICATION IS SENT FROM AN ____________ SOURCE TO THE RECEIVER WITH __________ TO _____________.

7 CYBER SPOOFING __________ SPOOFING – CREATION OF EMAIL MESSAGES WITH A _________ SENDER ADDRESS. __________ – ACTIVITY OF ___________ AN ONLINE ACCOUNT HOLDER OF _____________ INFORMATION..

8 CYBER SPOOFING ________________ – ALLOWS A PERSON TO TRACK ________________ON YOUR COMPUTER.

9 CYBER ___________ ___________ – INSTALLED SOFTWARE TO GATHER INFORMATION ABOUT AN INTERNET USER’S ______________________. _____________ – A PERSON __________ GETS ACCESS TO A COMPUTER SYSTEM IN ORDER TO GET______________, OR ________________.

10 CYBER ___________ THE PERSON IS TRYING TO GET _____________ INFORMATION TO OPEN A ______ ACCOUNT IN ___________ NAME, ______________ ITEMS WITH ANOTHER’S ________ ______, OR TAKE OUT A __________ IN ANOTHER’S NAME.

11 CYBER __________ ILLEGAL ______________ AND __________ OF SOFTWARE APPLICATIONS, GAMES, MOVIES AND AUDIO CDS. MAKING ________ WITHOUT PERMISSION

12 CYBER _____________ FORM OF __________ THAT IS AIMED AT ________, _______________, AND YOUNGER ____________ USING _____________.

13 IDENTITY _____________ THE _______________ ______________ AND USE OF A PERSON’S ___________ _____________ INFORMATION.

14 CYBER _______________ THE POLITICALLY MOTIVATED USE OF INFORMATION TECHNOLOGY TO CAUSE _________ ___________ AND/OR _________ AMONG A ____________.

15 CYBER _____________ TO CHANGE ANOTHER’S ______ WITH __________ INTENT.

16 CYBER ______ _____________ THE ACTIVITY OF USING THE INTERNET TO ATTACK A __________ COMPUTERS IN ORDER TO DAMAGE THINGS SUCH AS __________ AND _____________ SYSTEMS.

17 CYBER _____________ THE INVESTIGATION OF _______ EVIDENCE FOUND ON _________ AND OTHER DIGITAL _____________ DEVICES.

18 COMPARE CYBER CRIMES AND CYBER TORTS

19 CYBER CRIMES VS. CYBER TORTS CYBER ___________ CRIMES DIRECTED AT __________ USING COMPUTERS AND ALSO AGAINST OTHER _______________. CYBER __________ IS THE LEGAL TERM FOR CYBER CRIME. A CYBER CRIME HARMS A PARTICULAR ______ OR ___________ AS A RESULT OF THE CRIME.

20 CYBER TORTS ________________ – USING THE INTERNET WITH _______ ______________ THAT HARMS THE _____________ OF AN _____________, ________, ________, GROUP, GOVERNMENT, ____________, OR NATION. CYBER______________ – USING THE INTERNET ___________, THREATENING, ____________, HUMILIATING, EMBARRASSING, OR OTHERWISE ______________ INDIVIDUALS.

21 CYBER TORTS CYBER __________ – THE REPEATED USE OF ELECTRONIC COMMUNICATION TO ______ OR _________ SOMEONE (E.G., THREATENING E-MAILS). TRESPASS OF __________ – INTERFERENCE WITH ANOTHER PERSON’S LAWFUL POSSESSION OF MOVEABLE ______________– TAKING OR USING WITHOUT __________ ANOTHER PERSONS ELECTRONIC DEVICE OR SOFTWARE.

22 CYBER TORTS _______________ OR _______ – USING THE INTERNET OR COMPUTER DEVICES WITH INTENT OF _______________ FOR _________ OR _______________________. CYBER __________ OF _________ – INTRUSION INTO THE ________________OF ANOTHER.

23 DESCRIBE INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES

24 INTELLECTUAL PROPERTY RIGHTS RELATED TO DIGITAL PURCHASES LAWS PROTECTING THE CREATION OF ______________ (MUSIC, LITERATURE, AND ARTISTIC WORKS, DISCOVERIES AND INVENTIONS, COPYRIGHTS, TRADEMARKS, PATENTS, INDUSTRIAL DESIGN RIGHTS, TRADE DRESS, AND TRADE SECRETS.

25 COPYRIGHT LAWS RELATED TO DIGITAL PURCHASES A FORM OF ___________ PROVIDED TO AUTHORS OF “ORIGINAL WORKS OF _____________” THAT INCLUDES LITERARY, DRAMATIC, MUSICAL, ARTISTIC AND CERTAIN OTHER CREATIVE WORKS.

26 HOW DOES THE RIGHTS AND LAWS DIFFER FOR DIGITAL PURCHASES? PURCHASES MADE USING TECHNOLOGY IS ___________ AND CAN NOT BE _______.

27 DESCRIBE LAWS RELATED TO E-COMMERCE.

28 E-COMMERCE. IS THE TRADING IN _________ OR ___________ USING A COMPUTER NETWORK.

29 DIGITAL SIGNATURES IS AN _________ RATHER THAN A __________ ____________ THAT CAN BE USED BY SOMEONE TO ____________ THE IDENTITY OF THE SENDER OF A MESSAGE OR OF THE SIGNER OF A DOCUMENT.

30 THE E-SIGN ACT A US FEDERAL ______ PASSED BY THE US CONGRESS TO FACILITATE THE USE OF ELECTRONIC ____________ AND ELECTRONIC _____________ IN INTERSTATE AND FOREIGN COMMERCE BY ENSURING THE ___________ AND LEGAL EFFECT OF CONTRACTS ENTERED INTO ______________.

31 JURISDICTIONAL ISSUES OF BUYING PRODUCTS ONLINE FROM DIFFERENT STATES. COMPANIES CAN EASILY ____ TO ________ ANYWHERE IN THE WORLD WITH NO PHYSICAL PRESENCE IN ANY OF THE LOCATIONS. AND SO FAR, REGULATIONS AND LAW ARE A BIT MURKY. FUNDAMENTALLY, LEGAL EXPERTS SAY, FOR A COURT TO EXERCISE _____________ OVER A WEB SITE, IT MUST DETERMINE IF CERTAIN ______________ LIMITS OF DUE PROCESS ARE SATISFIED. IN ORDER TO DO THIS, A SITE HAS TO HAVE SOME PRESENCE IN THE STATE. - SEE MORE AT: HTTP://WWW.KLCPAS.COM/SORT-OUT-THE-JURISDICTIONAL- ISSUES-OF-E-COMMERCE/#STHASH.KLPE7VRF.DPUF HTTP://WWW.KLCPAS.COM/SORT-OUT-THE-JURISDICTIONAL- ISSUES-OF-E-COMMERCE/#STHASH.KLPE7VRF.DPUF

32 EXAMINE HOW THE USE OR PURCHASE OF TECHNOLOGY AFFECTS A CONTRACT.

33 TECHNOLOGY ALLOWS US TO BE __________ WORLD WIDE AND ALLOWS ___________ AND PURCHASES TO BE COMPLETED MUCH FASTER.

34 EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY AFFECT THE DIFFERENT AREAS OF LAW

35 DUE TO ADVANCES IN TECHNOLOGY AND THE INTERNET THE AMOUNT OF _________ RELATED TO INTELLECTUAL PROPERTY HAS INCREASED. HOWEVER, ___________ CAN HELP SOLVE CASES.

36 ADVANCES IN TECHNOLOGY PROMOTES CONSIST _______ FOR INTELLECTUAL PROPERTY, CONTRACTS, CRIMES, TORTS/CIVIL MATTERS, AS WELL AS __________________ BUSINESS.

37 EXPLAIN HOW ADVANCES IN COMPUTER TECHNOLOGY AFFECT THE DIFFERENT AREAS OF LAW TECHNOLOGY HELPS REACH A _______ NUMBER OF PEOPLE TECHNOLOGY INCREASES THE ______ OF WHICH WE CAN EXECUTE CONTRACTS. HOWEVER, LAWS NEED TO BE _______________ CONSTANTLY DUE TO TECHNOLOGY ADVANCES.

38 DESCRIBE THE VARIOUS TYPES OF FEDERAL AND STATE STATUTES DESIGNED TO COMBAT COMPUTER CRIME.

39 ELECTRONIC COMMUNICATIONS PRIVACY ACT A US FEDERAL ________ THAT PROHIBITS A THIRD PARTY FROM __________ OR ____________ COMMUNICATIONS WITHOUT AUTHORIZATION.

40 CYBER SECURITY ENHANCEMENT ACT INCREASES THE SECURITY OF FEDERAL ___________ AND INFORMATION SYSTEMS, IMPROVES THE TRANSFER OF __________ TECHNOLOGIES TO THE MARKETPLACE, TRAIN A CYBERSECURITY WORKFORCE, AND COORDINATES AND PRIORITIZE FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT EFFORTS.

41 DIGITAL MILLENNIUM COPYRIGHT ACT A _____ US LAW INTENDED TO UPDATE ___________ LAW FOR ELECTRONIC COMMERCE AND ELECTRONIC CONTENT PROVIDERS. IT _____________ THE CIRCUMVENTION OF ELECTRONIC AND DIGITAL COPYRIGHT PROTECTION SYSTEMS.

42 ECONOMIC ESPIONAGE ACT DEFINES THE TERM “_____________” AS THE THEFT OR MISAPPROPRIATION OF A ____________________WITH THE INTENT OR KNOWLEDGE THAT THE OFFENSE WILL BENEFIT ANY FOREIGN GOVERNMENT, FOREIGN INSTRUMENTALITY, OR FOREIGN AGENT.

43 FRAUDULENT ONLINE IDENTITY SANCTIONS ACT (FOISA) MAKES IT A ________ OF TRADEMARK AND COPYRIGHT LAW IF A PERSON KNOWINGLY PROVIDED, OR CAUSED TO BE PROVIDED, MATERIALLY _____ CONTACT INFORMATION IN MAKING, MAINTAINING, OR RENEWING THE REGISTRATION OF A DOMAIN NAME USED IN CONNECTION WITH THE VIOLATION.

44 COMPUTER SOFTWARE PRIVACY AND CONTROL ACT (CSPCA) TO PREVENT __________ SOFTWARE TRANSMISSION PRACTICES IN ORDER TO SAFEGUARD COMPUTER __________, MAINTAIN COMPUTER CONTROL, AND PROTECT INTERNET COMMERCE.

45 DESCRIBE THE RAMIFICATIONS OF IMPROPER USE OF BUSINESS TECHNOLOGY AND PROPERTY

46 WHAT ARE THE CONSEQUENCES FROM USING BUSINESS TECHNOLOGY FOR PERSONAL USE? KNOW THE ___________ AND ___________ AT WORK EMPLOYEES CAN BE _________ FOR ___________ USE.


Download ppt "EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES."

Similar presentations


Ads by Google