Download presentation
Presentation is loading. Please wait.
Published byClinton Anthony Modified over 9 years ago
2
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall
3
2 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack
4
3 Figure 12-1: Laws Governing Hacking U.S. National Laws Title 18, Section 1030 (http://www4.law.cornell.edu/uscode/18/1030.html)http://www4.law.cornell.edu/uscode/18/1030.html Enabling Legislation Computer Fraud and Abuse Act of 1986 National Information Infrastructure Protection Act of 1996 Homeland Security Act of 2002 Prohibitions Criminalizes intentional access of protected computers without authorization or in excess of authorization (Hacking)
5
4 Figure 12-1: Laws Governing Hacking U.S. National Laws Title 18, Section 1030 Prohibitions Criminalizes the transmission of a program, information, code, or command that intentionally causes damage without authorization of a protected computer (Denial-of-Service and Viruses)
6
5 Figure 12-1: Laws Governing Hacking U.S. National Laws Title 18, Section 1030 Punishment For first offenses, usually 1-5 years; usually 10 years for second offenses For theft of sensitive government information, 10 years, with 20 years for repeat offense For attacks that harm or kill people, up to life in prison
7
6 Figure 12-1: Laws Governing Hacking U.S. National Laws Title 47 Electronic Communications Privacy Act of 1986 (ECMA) Prohibits the reading of information in transit and in storage after receipt Other federal laws for fraud, etc.
8
7 Figure 12-1: Laws Governing Hacking U.S. State Laws Federal laws only protect some computers State laws for purely intrastate crimes vary widely
9
8 Figure 12-1: Laws Governing Hacking Laws Around the World Vary The general situation: lack of solid laws in many countries Cybercrime Treaty of 2001 Signatories must agree to create computer abuse laws and copyright protection Nations must agree to work together to prosecute attackers
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.