CYBER CRIME, LAW AND ETHICS

Cyber Crime / Computer Crime
Cyber crime also known as Computer crime is criminal activity done using computers and the Internet. The most prominent form of cyber crime is identity thief, in which criminals use the Internet to steal personal information from other users. Two of the most common ways to do such crimes are phishing and pharming. Both of these methods attracts users to fake websites, where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to “steal” another person’s identity. Using illegally obtained data, the criminal can open accounts, tires are wide range of goods and services, and then abandon the accounts. This leaves the victim in the position of having to deal with huge debts that he or she cannot generate. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. For this reason, it is better to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information.

Some of the common cyber crime are:
▪ Software Piracy: 
Software piracy is the act of illegally using, copying or distributing software without purchasing the software or having the legal rights. The majority of software purchased today is purchased as a one-site license, that means only one computer may have that software installed on it at one time. Copying that software to multiple computers or sharing it with your friend without multiple licenses is illegal and considered as software piracy.

▪ Hacking:
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Computer hacking is most common among teenagers and youth adults.

▪ Cracking:
Cracking is the process of breaking into copyrighted software or an information system with the intend of releasing software so that it can be used without paying royalties. Cracking is done by the persons known as cracker who steal the confidential data, acquire free access to perform the malicious destructions of files.

▪ Pornography: 
Pornography refers to the material that illustrate sexual behavior and is intended to cause sexual excitement. In other word, Pornography is the explicit illustrate of sexual subject matter for the purpose of sexual satisfaction. Pornography on the Internet is available in different formats. These range from pictures and short animated movies, to sound files and stories. Internet also makes it possible to discuss sex, see live sex acts, and arrange sexual activities from computer screens.

▪ Plagiarism:
Plagiarism is the act oftaking another person’s writing, conversation, song, or even idea and passing it of as own. This includes information from web pages, books, songs, television shows, email messages, interviews, articles, artworks or any other medium. It is not enough to just list the source in a bibliography at the end of the paper. Failing to properly quote, cite or acknowledge someone else’s words or ideas with an internal stating is plagiarism. 

▪ Harassment:
The harassment is any kind of behavior that is intended to upset, disturb, alarm or terrorize someone. The person carrying out the harassment might be a neighbor or groups of people living nearby, an ex-partner, family members or someone at work or school. It is the act of insulting, irritating the some one on the basis of gender, cast, religion, etc.


Cyber Law
In order to maintain harmony and co-existence of people in cyberspace, there is a need for a legal regime called as Cyber Law. Cyber Law is a term used to describe the legal issues related to the information technology, particularly Cyberspace. The growth of Cyberspace has resulted in the development of a new and highly specialized branch of law called cyber laws. Cyber Laws are the basic laws of a society and hence have implications on every aspect of the Cyber Society such as Governance, Business, Crimes, Entertainment, Information Delivery, Education etc.

The Cyber Law includes rules and regulations established to govern, prevent and resolve disputes that arise from the use of computers and the Internet. Cyber Law includes an ample variety of political and legal issues related to the Internet and other communication technology, intellectual property, privacy, freedom of expression and public access to information. Proper cyber law must govern all the cyber activities.

Following are the areas covered by cyber law.
▪ Digital Signature Law:
A digital signature is the security mechanism system in the cyber space. It is a digital identity of the sender that uniquely identifies particular sender electronically. Digital signature is used in the Internet for the secure transaction. Digital signature using two different keys for authentication; one for creating a digital signature or transforming data into a seemingly unintelligible form (private key) and another key is used for verifying a digital signature or returning a message to its original form (public key).

▪ Copyright Law:
The copyright act prevents the unauthorized copy off of work of authorship. However only the copying of work is prohibited but anyone can copy the ideas contained within the work. For example: a copyright could cover the written description of the machine but actual machine itself is not covered. Thus no one could copy the written description, while anyone could use the description to build a described machine.

Copyright can be registered in copyright office but newly created work does not need to be registered. However, the copyright act does provide additional benefits to those who registered with the copyright office. But the copyright registration and the use of copyright notice is recommended.

▪ Trademark Law:
Trademark law governs the use of a device (including word, phrase, symbol, product shape and logo) by a manufacturer to identify its goods and to distinguish those goods from those made or sold by another. Service marks, which are used on services rather than goods, are also governed by trademark law. However to obtain the greatest protection to a mark, it is almost always advisable to register the mark. A mark which is registered in the registration office should use the symbol (®). Unregistered trademark should be marked with a (™).

▪ Telecommunication Law:
Development in telecommunication has been rapid since some years. Almost all people are using the facility provided in telecommunication tools to share message from one location to other, to transfer the database from one location to another in the form of electronic data. We can transmit voice calls concerning the important issues and many more. In such transmission of voice or messages over the telecommunication system, many leakages might be done by the criminals on the data. Therefore, the telecommunication system also falls within the territory of the cyber space and forms a part of the cyber law.

▪ Data Protection and Privacy Law:
People are using computers to store the valuable data and data for the purpose of transmission from one location to other location. Data protection is the process of securing data from various disasters. Data plate AC is the second year in data without sharing with anybody else. Data protection and privacy law prevents the data from unauthorized access and punishes the criminals who steal the private data.


Computer Ethics 
Computer ethics can be defined as the set of moral principles that regulate the use of computers.
Or, 
Computer ethics is a system of moral standards or values used as a guideline for computer users.

Each society forms a set of rules that establishes the boundaries of generally accepted behavior. Those rules are often expressed in statements about how people should be behave and they fit together to form the moral code by which a society lives. Ethics is the set of beliefs about right and wrong behavior. Ethical behavior conforms Who generally excepted social norms, many of which are almost universal. Virtues are habits that incline people to do what is acceptable and vices are habits of unacceptable behavior. People’s virtues and vices held define their value system the complex scheme of moral values by which they live.

Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (digital) content, computer ethics would suggest that it is wrong to do without the author’s approval. And while it may be possible to access someone’s personal information on a computer system, computer ethics would advise that such an action is unethical.

The Commandments of Computer Ethics

Some commandments of computer ethics are as follows:
1. You shall not use a computer to harm other people.
2. You shall not interfere with other people’s work.
3. You shall not snoop around in other people’s computer files.
4. You shall not use a computer to steal privacy of other peoples.
5. You shall not use a computer to bear false witness.
6. You shall not copy or use proprietary software for which you have not paid.
7. You shall not use other people’s computer resources without authorization or proper compensation.
8. You shall not appropriate other people’s intellectual output.
9. You shall think about the social consequences of the program you are writing or the system you are designing.
10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans.

Comments