Cyber Crime and regulationsThe growth of technology has changed our lives dramatically. Computers were viewed as a luxury ...
Upcoming SlideShare
Loading in …5

Cyber crime and regulations


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Cyber crime and regulations

  1. 1. Cyber Crime and regulationsThe growth of technology has changed our lives dramatically. Computers were viewed as a luxury or evenan extravagance 30 years ago. People relied on television, newspapers, and radio as primary sources ofnews and information. Cables, modems, and online services were virtually nonexistent.Today, computers are prevalent in businesses, homes, schools, libraries, and even airports. The WorldWide Web provides instant access to news, reference information, shopping, banking, stock trading,auctions, and travel information and reservations. People routinely use the Internet to take college courses,play games, listen to music, and view videos. Chat rooms and e-mails are now replacing telephones asfavorite means of long-distance communication.The rise of computer technology obviously has enhanced our lives in many ways, such as enablingimproved productivity and efficiency at work, school, and home. Anyone with access to a computer andmodem now has unparalleled recreational and educational opportunities.Unfortunately, criminals are also using modern technology—to prey on innocent victims. Computers and theInternet have made the criminal’s job easier. Historically, predators found their victims in...This approach eliminates many of the risks predators face when making contact in person.Online Pornography - possessing or distributing child pornography is against federal law and distributingpornography of any form to a minor is illegal.There is a huge impact on the victims of cyber stalking. In contrast, the state attorney generals offices inneighboring states indicated they have never received an inquiry into this type of behavior. Like conventionalterrorism, `e-terrorism is classified as such if the result of hacking is to cause violence against persons orproperty, or at least cause enough harm to generate fear. This act will create a national fraud alert systemso consumers have to make just one telephone call to report fraudulent activity.The Cyber-Crime and Intellectual Property Theft program seeks to collect and disseminate data andresearch on six popular categories of cyber-crime that directly impact citizens and consumers.• The lack of adequate statutory authority also can limit law enforcements response to cyberstalkingincidents. Hacking is also the act by which other forms of cyber-crime (e.“Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, suchas following a person, appearing at a persons home or place of business, making harassing phone calls,leaving written messages or objects, or vandalizing a persons property. Then, one day, a regular participantsent her a threatening e-mail. Most cyberstalking laws, however, allow for prosecution if someone receivesrepeated e-mails threatening violence.