SlideShare a Scribd company logo
1 of 14
Technology & The Law
Charles McCann, Jacob Sleiman & Max Tassell
Impacts
Technology’s
impact has been
immense, with
advancements in
communication,
medicine,
education and
cyber warfare.
Impacts
It has given people easy
access to information,
instant communication
to another person
across the globe, rapid
media output and
immediate feedback on
projects such as
videos, reports, games
and so on.
Impacts
Amongst these
advancements,
many issues have
arisen that have
made policing said
technologies a
tiresome and
expensive ordeal.
Impacts
These include the loss
of privacy, lack of
territorial jurisdiction
(making it especially
difficult for the
government to police
cyber crimes), greater
vulnerability to cyber
crimes and anonymity.
Impact on the Victim
For the victim of a cyber
crime, technology’s
impact is remarkable as
the victim, in some
cases, doesn’t always
receive a just form of
compensation to them
and a fair punishment
to the perpetrator.
Because of
technology’s
considerable
breadth, finding
the perpetrator
in the first place
is a tough job in
and of itself.
Impact on the Perpetrator
As for the perpetrator, if
they’re caught, their
reputation is at stake of
being permanently
tarnished. Their actions
in the digital world have
real and concerning
results in the real world.
If they aren’t
caught however,
their free, as a
result of the
accessibility of
technology, to
roam around
causing havoc.
The government
will almost
always be one
step behind
these people.
Enforcing the Law
Policing the internet
is a tremendously
tiresome task as
factors including
legal jurisdictions for
governments,
anonymity and the
ethical and legal
issues regarding
surveillance.
Unlike real-life crimes and the
subsequent evidence, the evidence in
a cyber crime case can be much more
easily tampered with as it’s all
essentially a string of ones and zeros.
Enforcing the Law
An investigator can contaminate the
evidence simply by examining it, and
sophisticated cyber criminals can set
up their computers to automatically
destroy the evidence when accessed
by anyone other than themselves.
Enforcing the Law
The rights of the victim are
particularly difficult to enforce
as more times than not, they
aren’t aware that the cyber
crime has occurred to them,
thus reports aren’t made.
More times than not though,
victims don’t report cases of
cyber crime as they’ll be seen
as embarrassing or
commercially damaging.
Enforcing the Law
The rights of the
perpetrator are, too,
especially difficult to
enforce as they may
fall victim to unethical
police tactics such as
entrapment and
unkown surveillance.
Case: Overview
In 2011, David Noel Cecil was charged on forty
counts of hacking into systems owned by Platform
Networks. He obtained the usernames and
passwords of the managing director.
For this, David was sentenced to 6 months in
jail on 18 charges and another 2 years on the
remaining 22 charges.
Case: Overview
Case: Legal Implications
He pleaded guilty to 2
counts of, “Unauthorised
modification of data to
cause impairment
pursuant” to Section 477.2
of the Criminal Code and 18
counts of, “Unauthorised
access to data pursuant” to
Section 478.1 of the
Criminal Code.

More Related Content

What's hot

digital law
digital lawdigital law
digital law11tsk
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT SecutiryGranthamEdu
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyDee Green
 
Fot project
Fot projectFot project
Fot projectkmelam2
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it startedNavjyotsinh Jadeja
 
Digital law
Digital lawDigital law
Digital lawmakylahh
 
Digital law
Digital lawDigital law
Digital lawCAQUES01
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Asset slide-show-identifying-it-security-threats (1)
Asset slide-show-identifying-it-security-threats (1)Asset slide-show-identifying-it-security-threats (1)
Asset slide-show-identifying-it-security-threats (1)David Robinson
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenCapitolTechU
 

What's hot (19)

digital law
digital lawdigital law
digital law
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital law
Digital lawDigital law
Digital law
 
Cybercrime | IT Secutiry
Cybercrime | IT SecutiryCybercrime | IT Secutiry
Cybercrime | IT Secutiry
 
Greendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copyGreendeana unit 8 project cj216 copy
Greendeana unit 8 project cj216 copy
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
Fot project
Fot projectFot project
Fot project
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Digital law
Digital lawDigital law
Digital law
 
Digital law
Digital lawDigital law
Digital law
 
attach2
attach2attach2
attach2
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Asset slide-show-identifying-it-security-threats (1)
Asset slide-show-identifying-it-security-threats (1)Asset slide-show-identifying-it-security-threats (1)
Asset slide-show-identifying-it-security-threats (1)
 
Webinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aikenWebinar slides sept 23 2021 mary aiken
Webinar slides sept 23 2021 mary aiken
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
2010 opensciencepeterson
2010 opensciencepeterson2010 opensciencepeterson
2010 opensciencepeterson
 

Viewers also liked

Sistema operativo vanesa ordoñez
Sistema operativo vanesa ordoñezSistema operativo vanesa ordoñez
Sistema operativo vanesa ordoñezvannetuchiquita
 
Anishkumar_Resume
Anishkumar_ResumeAnishkumar_Resume
Anishkumar_ResumeAnish Kumar
 
Ampt2live project proposals 2016
Ampt2live project proposals 2016Ampt2live project proposals 2016
Ampt2live project proposals 2016Claudia Dalias
 
iQC雲端平台簡介 20131118
iQC雲端平台簡介 20131118iQC雲端平台簡介 20131118
iQC雲端平台簡介 20131118iqc-tw
 
Business & Education Rewards Report - Alex Holland
Business & Education Rewards Report - Alex HollandBusiness & Education Rewards Report - Alex Holland
Business & Education Rewards Report - Alex HollandAlex Holland
 
Best Cell Phone in 2016
 Best Cell Phone in 2016 Best Cell Phone in 2016
Best Cell Phone in 2016zabir123
 

Viewers also liked (11)

Sistema operativo vanesa ordoñez
Sistema operativo vanesa ordoñezSistema operativo vanesa ordoñez
Sistema operativo vanesa ordoñez
 
Certificate_1
Certificate_1Certificate_1
Certificate_1
 
Anishkumar_Resume
Anishkumar_ResumeAnishkumar_Resume
Anishkumar_Resume
 
Ampt2live project proposals 2016
Ampt2live project proposals 2016Ampt2live project proposals 2016
Ampt2live project proposals 2016
 
iQC雲端平台簡介 20131118
iQC雲端平台簡介 20131118iQC雲端平台簡介 20131118
iQC雲端平台簡介 20131118
 
Salario dos engenheiros
Salario dos engenheirosSalario dos engenheiros
Salario dos engenheiros
 
CURRICULUM VITAE
CURRICULUM VITAECURRICULUM VITAE
CURRICULUM VITAE
 
Business & Education Rewards Report - Alex Holland
Business & Education Rewards Report - Alex HollandBusiness & Education Rewards Report - Alex Holland
Business & Education Rewards Report - Alex Holland
 
Best Cell Phone in 2016
 Best Cell Phone in 2016 Best Cell Phone in 2016
Best Cell Phone in 2016
 
Mi rutina
Mi  rutinaMi  rutina
Mi rutina
 
Wikis
WikisWikis
Wikis
 

Similar to Technology & The Law (20)

Cyber Forensics.ppt
Cyber Forensics.pptCyber Forensics.ppt
Cyber Forensics.ppt
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
I need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docxI need a to respond #2 below- with at least 150 words and include ci.docx
I need a to respond #2 below- with at least 150 words and include ci.docx
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber Crime Investigation
Cyber Crime InvestigationCyber Crime Investigation
Cyber Crime Investigation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 

Recently uploaded

一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxnibresliezel23
 

Recently uploaded (20)

一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Greater Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
 

Technology & The Law

  • 1. Technology & The Law Charles McCann, Jacob Sleiman & Max Tassell
  • 2. Impacts Technology’s impact has been immense, with advancements in communication, medicine, education and cyber warfare.
  • 3. Impacts It has given people easy access to information, instant communication to another person across the globe, rapid media output and immediate feedback on projects such as videos, reports, games and so on.
  • 4. Impacts Amongst these advancements, many issues have arisen that have made policing said technologies a tiresome and expensive ordeal.
  • 5. Impacts These include the loss of privacy, lack of territorial jurisdiction (making it especially difficult for the government to police cyber crimes), greater vulnerability to cyber crimes and anonymity.
  • 6. Impact on the Victim For the victim of a cyber crime, technology’s impact is remarkable as the victim, in some cases, doesn’t always receive a just form of compensation to them and a fair punishment to the perpetrator. Because of technology’s considerable breadth, finding the perpetrator in the first place is a tough job in and of itself.
  • 7. Impact on the Perpetrator As for the perpetrator, if they’re caught, their reputation is at stake of being permanently tarnished. Their actions in the digital world have real and concerning results in the real world. If they aren’t caught however, their free, as a result of the accessibility of technology, to roam around causing havoc. The government will almost always be one step behind these people.
  • 8. Enforcing the Law Policing the internet is a tremendously tiresome task as factors including legal jurisdictions for governments, anonymity and the ethical and legal issues regarding surveillance.
  • 9. Unlike real-life crimes and the subsequent evidence, the evidence in a cyber crime case can be much more easily tampered with as it’s all essentially a string of ones and zeros. Enforcing the Law An investigator can contaminate the evidence simply by examining it, and sophisticated cyber criminals can set up their computers to automatically destroy the evidence when accessed by anyone other than themselves.
  • 10. Enforcing the Law The rights of the victim are particularly difficult to enforce as more times than not, they aren’t aware that the cyber crime has occurred to them, thus reports aren’t made. More times than not though, victims don’t report cases of cyber crime as they’ll be seen as embarrassing or commercially damaging.
  • 11. Enforcing the Law The rights of the perpetrator are, too, especially difficult to enforce as they may fall victim to unethical police tactics such as entrapment and unkown surveillance.
  • 12. Case: Overview In 2011, David Noel Cecil was charged on forty counts of hacking into systems owned by Platform Networks. He obtained the usernames and passwords of the managing director.
  • 13. For this, David was sentenced to 6 months in jail on 18 charges and another 2 years on the remaining 22 charges. Case: Overview
  • 14. Case: Legal Implications He pleaded guilty to 2 counts of, “Unauthorised modification of data to cause impairment pursuant” to Section 477.2 of the Criminal Code and 18 counts of, “Unauthorised access to data pursuant” to Section 478.1 of the Criminal Code.