Please enable JavaScript.
Coggle requires JavaScript to display documents.
Criminal Law and tort Law Issue in Cybersecurity - Coggle Diagram
Criminal Law and tort Law Issue in Cybersecurity
Common Criminal Laws Used in Cybersecurity
To commit a crime
Unauthorized access to data and online fraud
To Facilitate a Crime
Cyberstalking, Identity theft, Phishing scams, and software piracy
As a Target of Crime
DoS attacks and DDoS attacks, computer virus, and communication sabotage
As a Witness to Crime
Computerized record-keeping systems may provide evidence of an underlying crime or event
Computer Fraud and Abuse Act (CFAA)
Types of protected computers as described by CFAA
Federal Government computer
Finicial Insitutuion computer
Computer used in interstate or foreign commerce
Criminal Activity when computers are the victims of the crime
Unauthorized access to government computer
Unauthorized access to information on a protected computer
Unauthorized access to a protected computer that cause damage
Unauthorized access to a protected computer with an intent to defraud
Threatening to damage a protected computer
Unauthorized trafficking of passwords or other computers access information that allows people to access other computers without authorization and with the intent to defraud
Computer espionage
Spam and Phishing Laws
Do not use false or misleading header information
do not use deceptive subject lines
Identify the email message as a commercial advertisment
Include a valid physical postal address
Inform message recipients postal address
Promptly process opt-out request
Monitor the actions of third parties that advertise on the sender's behalf