Saturday, December 12, 2009

10 Important Things in Cyber Law

Cyber Law deals with the legal issues of the internet usage and all devices connected over the network, their proper use in order to prevent and control cyber crimes. Since the internet is all over the world the rules and regulations are a bit cloudy but we need to keep in mind a few things to ensure that we are using the internet in a proper and safe manner without causing any trouble.

1. The internet's jurisdictional boundaries may not be clear but the users are bound by the jurisdictional laws of the area in which they reside.

2. Do not access web sites that may not be approved by the jurisdiction in your area.

3. Do not post any offensive material that may cause an outrage among other internet users. Articles with an offensive tone on sensitive subjects like religion, politics etc., Uploading child pornography and other offensive materials is considered a crime in many countries and is punishable depending upon the country's laws.

4. Illegally downloading and distributing protected items like intellectual property and copyrighted articles is a cyber crime and those who are caught engaging in such acts can be prosecuted.

5. Duplication of content or software from CDs and DVDs that are copyrighted and distribution of these on the internet is punishable.

6. Stealing user information (phishing) and impersonating a user (ID theft) are serious cyber crimes.

7. Sending bulk messages that can affect networks and jam mailboxes is called spamming. The US introduced CAN-SPAM Act t in 2003 that allows prosecution of spammers.

8. Sending malicious codes such as viruses and worms through websites and e-mails is a cyber crime that can cause serious damages and anyone caught engaging in the act can be seriously punished.

9. Any site that allows users to download materials without acquiring proper permissions can be prosecuted or even be made to close down. Napster.com was shut down for similar reasons.

10. Illegal bank transactions through internet, to any dangerous individuals who might threaten national security is a cyber crime that will be considered as a breach of national security and those caught engaging in such acts can be punished by the government.

Even though the Cyber Laws are not very clear to every one the increase in cyber crime rate has pushed many governments to introduce Acts that would govern the cyber space at least within their jurisdictions. The governments of USA, UK, Canada and China have enforced Cyber Laws to control Cyber crimes. The other nations that have followed in introducing Cyber laws are India, Australia, Malaysia, Iran, Iraq, Indonesia, Thailand etc. Among all these nations China emerges to be the strictest in its laws regarding the use of the internet.

About the Author:
Himlal Pun - PHP programmer, India and founder of sisnolabs - website development services

Article Source: http://EzineArticles.com/?expert=Himlal_Pun

Cybercrime

Security online may not yet match the full number but with the popularity the internet is gaining every month, how long before we see numbers of this magnitude?

What are we to do to secure our identities?

Available to this point is:

  • Offline companies that monitor our personal information; once a theft occurs, they are there to help you
  • Never do any online activity; who intends to live in a cave in the middle east
  • Keep your usernames, passwords, credit card numbers and other information hidden; near our computers written down so we don't forget
  • Create a file on our computers that stores this information; don't leave your computer near a hacker
  • Store information on an offsite backup hard drive or flash drive; home invasions take computers, flash drives are small and can seem to walk away with keys
  • Biometric technology; new technology coming on the scene, don't know much about this?
Some interesting ways that a lot of people store personal information? It is as though the personal information isn't too important when passwords for important accounts are placed under a keyboard, tacked to the wall, written sticky pad paper tacked on a Kleenex box.

And these are down at the office where we may never know who is in the vicinity of our computers. If an office is large enough and we have had too much coffee, we are only away for a short time?

Think about your "safe" location. Think about your personal habits each day and how much you take for granted. As the economy continues to crawl, opportunistic people may find out how trusting they really are.

Personal identification should become more important to you today than ever before, even more so in the future. With internet security comes confidence because you know that identity authentication after the fact is a long and arduous task.

If you aren't aware, the director of the FBI was almost a victim of phishing recently, so if it could happen to him??? Listen, we all believe it happens to others; never to us. Same goes for the guy who was car jacked earlier today.

For information that can provide you security, to a level that can keep your most precise information secure, visit our site http://bit.ly/BioSecurity and think about what you could do differently to protect you.

Who is that looking over your shoulder?

Recent technology has provided us ways to protect our usernames, passwords, credit card numbers and vehicles. Don't fall victim to opportunistic individuals.

Tim R Adami, owner of Eagle Flight Marketing Group believes your security can be your most important effort. Do you?

http://eagleflightmrkg.com/Eagle-Security.php

"Procrastination Has No Advantages"

Article Source: http://EzineArticles.com/?expert=Tim_Adami

What is Cyber Secutiry?

It seems that almost everything now relies in internet and computers - entertainment, communication, transportation medicine, shopping, etc. How much of your life is dependent on internet? How much of your information is stored on your or someone else's computer? With such a high dependency on computers, neglecting the increase in Cyber crime is extremely harmful.

Cyber security actually protects your personal information by responding, detecting and preventing the attacks. Cyber security is actually introduced to decrease cyber crimes. All banking institutions and businesses today run their business online. Hackers can hack your computer system and misuse your personal information and pictures. Various other dangers associated with cyber crimes are entry of virus into your system, altering your files, change of passwords, stealing credit card information and make unauthorized purchases.

Today, there are several universities and colleges that are offering Cyber degrees. In associated degree program you can learn about cyber forensics, data encryption, network security, etc. In the associate degree program a student is taught to use the recent technology and ensure that digital information communication is carried in an appropriate manner that is secured from surveillance or attack by expert hackers and malevolent computer users. Organizations and businesses will have ascending requirement for cyber professionals in future to protect their company's records and private information.

A degree in this field will provide you with an opportunity to work as a computer support technician, systems administrator, network administrator or similar position. People with associate security degrees may enjoy following career opportunities and annual incomes:

Network Administrator: $58,190

Support Specialist: $40,430

Systems Administrator: $58,190

The career opportunities for cyber security profession is expected to increase in the coming few years. The demand for systems administrators and network administrators will grow at a rapid rate.

The typical coursework for the Associate Cyber Security Degree includes Cyber forensics, Computer hardware, Cyber security, working with Computers and Internet, applied mathematics and software support. In the degree course program a student is expected to learn about antivirus software, encryptions, firewalls, and other similar techniques to ensure the safety of data communications as per your company's guidelines.

Want to make my career in Cyber Security? Find best Criminal Justice Programs in Cyber Security at CriminalJusticeU.com. Here you will find all information about Criminal Justice Schools, degree, programs & more other information.

Article Source: http://EzineArticles.com/?expert=Erik_R_Johnson

Internet and Computer

Overall, across the country computers are becoming much more a part of everyone's life. When I went to college you went to school and then had to go to a computer lab to do your homework. Several families had a computer in their home, but having the internet on any computer was not as common. Then of course, having a laptop was absolutely unheard of. Times have changed and now the internet and computers are available everywhere you turn. Most college students have their own laptop and can sit and work on their work or access their class information while sitting in class.

For many of us we love having this type of access. We love that we can access the internet from our phones or from anywhere we go. There are a million reasons to think that the computers, internet and access to the world at our fingertips is an amazing thing. It seems that with all great things there can be negatives. Child pornography has become much more prevalent due to the access to the internet. Whether you live in Los Angeles or live in Philadelphia it is important to recognize the importance of protecting your own children and those around you. Not only is it important to protect your own children, but if you come across anything on the internet it is important to report it.

You might not know where to turn for help if you find child pornography but it is important to look to lawyers that are specialized in the area that you live. If you live in Philadelphia you will want to get a Philadelphia child pornography lawyer. They are aware of the laws in your state and can help you make a difference.

Marc Neff Attorney-at-Law (http://www.nefflawoffices.com/) limits its practice to federal and state criminal defense and related matters, including grand jury investigations, parole matters, and forfeiture cases. Ryan Coisson is a freelance writer.

Article Source: http://EzineArticles.com/?expert=Ryan_Coisson

About Cyber Crime

How protected are you from cybercrime? I know I was not protected at all. I have been a Norton Security user for the last 10 years. I thought I was protected. You can imagine how surprised I was to find Trojan viruses and several others on my personal computer. Some of the viruses I found on my computer were: Trojans, Sobig, Sasser and Kama Sutra.

Trojan spy program is designed to steal sensitive user data and to manage the victim's computer system remotely. It is an executable file. It has only 470 bytes - not a significant amount of space to occupy on your computer. The damage it can create is devastating. After your computer is hijacked, it becomes a tool in the criminal's hands and acts like a zombie.

I recently found out that cybercrime profits are higher then profits of illegal drug trafficking. According to president Obama, there were 8 billion dollars stolen from Americans only in the last 2 years. Last year the price of repairing hijacked consumer systems has risen to 11 billion dollars. Why does cybercrime continues to thrive today? Evgeny Kaspersky, a known cybercrime authority, says that we need better Internet Regulations. In his opinion, individuals need Internet Passports, businesses have to have accreditation.

Would it help if internet anonymity ceased? If every computer, every person and every company was identifiable a lot of problems could be solved. Online dating experience could be more rewarding if men and women were identifiable. There could be much more trust between people, if everybody could be identified.

On the other hand, being totally identified could trigger various dangers for single people, for example, for older people and for children.

If it was up to me, I would not mind to have an Internet Passport. I think that companies should be identifiable. Besides, I think if all companies were identifiable, the revenues of these companies would go up. If a consumer orders a product on internet, he/she should have all the information necessary to receive the product and to get the refund if it comes to that point.

If it was your choice, would you rather have an Internet Passport? Please, visit the website to answer the question.

Alla Goltsman is a computer consultant involved in software development, technical writing and operations of mid-frame companies that use IBM iSeries computers. She is a webmaster at compubasket.com. Visit her blog for money saving internet tips and further information about software for your computer, electronics, gadgets, home based business and answers to many computer questions. Alla also writes about blogging and blog monetization. Follow Alla on Twitter http://twitter.com/1galla

Article Source: http://EzineArticles.com/?expert=Alla_Goltsman