Access over 20 million homework & study documents


BUS311 Cyber Law Final Paper






Showing Page:
Title: The new frontier, Cyber Law
BUS311: Business Law I (BAI1331A)

Sign up to view the full document!

lock_open Sign Up
Cyber Law. I would like you to take a closer look with me into the inner workings of
cyber law. In this paper I will discuss how these laws affect both our personal and business lives.
I will include information about internet safety, privacy, plus the different laws that regulate the
internet and its uses.
The major statutes regulating cyber activity include criminal law, tort law, contracts, and
intellectual property. Let’s first consider what kind of criminal activity can be considered cyber
Hacking is one of the well known cyber criminal activities. There have been movies
based on hacking and most of the time they portray the hacker trying to do something good or
what they believe is right. In the real world hackers often leave malicious programs or render a
computer useless. In the process they take files and information that could be confidential or
important to a company or person.
“This eventually resulted in the creation of new regulations including the federal
Computer Fraud and Abuse Act of 1986 (CFAA). The CFAA applies to any computer on the
Internet (which today is the vast majority of them) and prohibits computer trespass, fraud,
espionage, theft, damage to a computer such as planting viruses or worms, and selling of
computer passwords, among other things.’
‘However, the CFAA only applies within the United States, which considerably limits its
effectiveness. Many hackers operate from outside the United States, even if their victims are in
this country.’” (Rogers, S. Essentials of Business Law (2012) chpt. 14)
A hackers specialty could include identity theft. Research shows that “identity theft is a
growing problem: in 2010, 7.0 percent of households in the United States, or about 8.6 million

Sign up to view the full document!

lock_open Sign Up
households, had at least one member age 12 or older who experienced one or more types of
identity theft victimization.” (Rogers, S. Essentials of Business Law (2012) chpt. 14) Identity
theft is not happening to just individuals. Now hackers have been able to create dummy sites of
businesses and steal their client’s information in order to gain access to the businesses site and
take what they can.
At the same time if the hackers only goal is to steal the clients information this is called
phishing. This happens for example when the client gets an e-mail asking the client to log in and
verify their information. The link is to a dummy site and the information is recorded and then
used to gain access to the account.
Cookies, hackers and companies both use them to track information. Thousands of
cookies are stored on computers around the world. They keep track of every website you go to
and even what you type repeatedly on your computer. Then this information is traded and sold to
marketers, the government, and other hackers. This seems very unethical and is done in a very
underhanded way in my opinion. Even trying to install a simple driver for my computer can
result in installing two or three other programs plus adware. This kind of pushy advertising has
got to stop.
Let’s continue with the issue of installing a program. As you start you are prompted with
a box that says agree and accept or decline. In this box is generally a long list of legal fill text.
This is called a click-wrap. Business use these to protect themselves from being liable and
getting sued. Some may think that this is unnecessary and want it shortened for the average user.
I think it is totally ethical to have the legal content in the beginning before the user installs the

Sign up to view the full document!

lock_open Sign Up
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Really great stuff, couldn't ask for more.