About Me

Subscribe now!Feeds RSS

Latest posts

Hot Links

วันพฤหัสบดีที่ 30 กรกฎาคม พ.ศ. 2552

lawters com

0 comments

Remember, Bruce Willis, the main protagonists in the fourth installment of the
Die Hard series last summer? Live Free or Die Hard Willis shows how the New
York Police Detective John mcclane, whose mission is to create a
Gang of "cyber-terrorists" who are shutting down the entire world of the Internet.
In today's increasingly volatile world of mobile activated bombs and websites
various militant groups, it is not hard to imagine that the hard-scenario
materialized in real life too.

One of the most fascinating aspects of modern technology is, how it is
penetrated every area of application and strata of society. Each of the uneducated
Mechanics of high-profile Chief Executive Officer of the company now with a
Mobile and is aware of what a computer is. The penetration of technology in
our communities has largely proved to be advantageous. But like any other
Good thing, technology can also be used. Such exploitation, inter alia,
Things, has led to certain criminal offenses by or against
Computers, their affiliated networks and the information contained in them.
Thus came about the neologism of cyber crime.

Even if the term is now widely used in law circles, disagreements are
lots, which actually means cyber crime. President of the Naavi.org,
India's largest cyber law portal information indicates that the term is a
misleading. "The concept of cyber-crime is not fundamentally different from that of
conventional crime, says in a report on the portal, "" Both belong behavior
whether an act or omission that violated the provisions of the Act and [are]
by the sanction of the state. Cyber-crime can say that [a
of] this species, of which the genus is the conventional crime, and where either
the computer is an object or behavior, crime,

Despite the comparable legal character of the two conventional and cyber-crime,
they are essential in practice. Cyber-crimes are much easier to
learn how to commit to require less resources in terms of potential damage
can be caused, in a legal system without physically present in,
and, until recently, the status of illegality was, at best, vague. Since the
global technology and management consulting firm McConnell Institute
notes in a comprehensive report on the topic in many countries existing archaic
Laws threaten the global dynamic

"The growing threat of crimes against computer or against
Information about computer, starts to claim attention in national capitals.
In most countries around the world, the existing laws are likely
unenforceable against such crimes. "

The report added: "Existing terrestrial laws against physical acts of Trespass
or breaking and entering often do not cover their "virtual" counterparts. New
Types of crimes can be made between the cracks. "

Moreover, efficient law enforcement further complicated by the
transnational nature of cyberspace.

"Mechanisms of cooperation across national boundaries are complex and slow. Cyber
Criminals can defy the traditional realm of the sovereign jurisdiction of nations,
Origin of an attack from almost any computer in the world, past, be it within the
several national boundaries, the design or attacks, which originate
from foreign sources. These techniques dramatically increase both the technical
and legal complexity of the investigation and prosecution of cyber crimes. ""

To protect from those who steal, to access or destroy
valuable information to the public and private institutions have increasingly
on the safety technology. But in today's fast world of e-commerce, even
Protection, however, essential, but can not for a lack of legal certainty
Protection. In many countries, therefore, now have their own laws against
such activities.

The Act covers two basic types of cyber crimes. One in which the computer
course objectives (eg, criminal data access, data damage, malignant
Code, and various other types of information theft on computer networks), while
the other, in which computers and other technologies as a tool to
virtual versions of the various conventional crimes (such as cyber-terrorism,
electronic fraud and forgery, cyber stalking and spamming, etc.).

For the average Internet surfer, not the technical definitions of the most
these offenses, the law can be very confusing at first glance. It is
come as no surprise that disagreements over the regulation of
Interpretation is also in the wider legal fraternity. In particular, it is
It is under attack from civil rights and a part of the lawyers who
condemn them as "effective and virtually useless [...] against cyber crime"
but to create "enormous obstacles and harassment for the IT-enabled
[...] Companies and individuals "as well as significantly sacrificing individual
Freedoms as set out in privacy.

Mark Tamale (former member of the IT Law Forum and the
Ministry of Science and Technology), at the tip of the
Awareness, "Take a bite out of cyber-crime law has criticized
These and other parts of the regulation as well as ambiguous. It means that
The law could, as a consequence that even something as harmless as Googling
'How to build a nuclear bomb "of a" terrorist act ". Surely, however, the" knowingly
engaged in "Part of the statue and the subsequent definition of

"IC-terrorists intent" should this possibility very unlikely.

One concern, however, at least for the average citizen would be
Privacy. Sections of the Act on the social responsibility of companies require that all
Internet Service Provider to store up to 90 days of data on consumers'
Internet usage. Service providers also, in turn, legally obliged to
With the federal law enforcement authorities if they require such data. This broad
reaching powers to law enforcement agencies are a common feature of
Regulation, which also authorizes the Federal Investigation Agency to issue a
Arrest without direct involvement of the judiciary.

This means that, in fact, if the people found, how to build a picture of the
People who always stands at the beginning of the track and then in your
Blog, you can end in jail (§ 13 (d) of the Act makes it illegal
the distribution of images on the web without the prior express consent of the
Person in the picture). You can also arrested bombed all
"Frands" with Valentine's Day wishes (Section 13 specifies how cyber-stalking
"Communicating obscene, vulgar, profane, indecent, lascivious or indecent language,
Image or images with the intent to compel, intimate, or harass any person with
a computer network, Internet, network, website, e-mail or a similar
Means of communication ").

Worse still, if you committed any of 21 offenses in the bill in your
Office, you will not only end in jail, but your landing Heads
in hot water as well. For section 21, for crimes committed by a juridical person, in possession of
Corporation responsible for all acts, which was committed on its instructions or
for his performance. Some of these definitions, even by lay standards very color
abstruse criteria.

Even if one sets aside valid concerns about the lack of procedural safeguards
and the proper procedures to protect the rights and freedoms of individuals,
can not help but wonder how it should be a nightmare for the implementation of the law, and
then prove the allegations in a process, especially given the international nature
of cyber-crime. Unless the crimes which they are presented in a manner
in all other international jurisdictions, coordinated efforts by law
Enforcement officers to combat cyber-crime is still complicated and largely
unsuccessful. There is also a very urgent need to educate law enforcement
themselves about the nature of the technology so that they are between
appositely between casual surfers and real cyber-criminals. The reputation of the past
our law enforcement does not mean that a lot of confidence in these
Respect.

In short, a separate regulation for cyber-crime is in itself a step in the
right direction. After all, the rule of law in which property was always also a
Flowering time for a trusted environment for business and individuals,
for you, but only by a law is never enough to prevent any restriction crime;
The real deterrent is its implementation and public awareness.

And if you're concerned about the security of your personal computer or if you work for an organization, there are many security software are available on the market, but it is better to opt for Checkpoint certification exams, Microsoft or Cisco Security Exams Security Exams best protection for their own good, and the preparation for these exams http://www.testkingdom.com is the best and most current and real versions of the exams you are looking for. They study with the most realistic material.

Comments
0 comments
Do you have any suggestions? Add your comment. Please don't spam!
Subscribe to my feed

แสดงความคิดเห็น