17
© ITT Educational Services, Inc. All rights reserved. IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

Embed Size (px)

DESCRIPTION

IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law. Learning Objectives. Describe the role of contracts in online transactions and cyberspace. Identify cybercrime and tort law issues in cyberspace. Key Concepts. General principles of contract law - PowerPoint PPT Presentation

Citation preview

Page 1: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.

IS3350 Security Issues in Legal Context

Unit 8

Cyberspace and the Law

Page 2: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 2IS3350 Security Issues in Legal Context

Learning Objectives

Describe the role of contracts in online transactions and cyberspace.

Identify cybercrime and tort law issues in cyberspace.

Page 3: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 3IS3350 Security Issues in Legal Context

Key Concepts

General principles of contract lawContracts in cyberspace and online

transactionsGeneral principles of criminal lawCybercrimeTort concepts in cyberspace

Page 4: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 4IS3350 Security Issues in Legal Context

EXPLORE: CONCEPTS

Page 5: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 5IS3350 Security Issues in Legal Context

Contract Law

Clarify relationships between individuals, groups, and organizations

Formed by two elements: offer and acceptance

Accepted offer and terms are binding on both parties

Terms are enforceable in a court of law

Page 6: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 6IS3350 Security Issues in Legal Context

Contract Law (Continued)

Oral and Written ContractsSpecific types of contracts must be written

down and must be signed• Written to Prevent Fraud • Contracts for the sale of land

Contracts require reciprocal exchange of value

Page 7: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 7IS3350 Security Issues in Legal Context

Tort and Criminal Law

Tort law is part of civil law• Refers to wrongful acts or harm for which an

individual can sue the person who caused the harm• Governs disputes between individuals• Follows what is called The Reasonable Man

standardCriminal law deals with violations against

societal norms

Page 8: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 8IS3350 Security Issues in Legal Context

Three Categories of Tort Law• Strict Liability

• Responsible for actions even if no intent to cause harm to another person.

• Negligence • Liable for any injuries or harm that are the

foreseeable consequences of actions when "Due Care” was not exercised

• Intentional • Intention to commit the act is demonstrated • Often share many common elements with a crime

Page 9: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 9IS3350 Security Issues in Legal Context

Characteristics of Criminal Law Criminal law aims to deter wrongful behavior

• Punishment for behavior• Rehabilitation of the offender

Society recognizes two basic types of wrongful conduct• Conduct universally agreed to be wrong or dangerous

to others• Conduct that isn’t inherently wrong, but society

prohibits it Misdemeanors and Felonies

• Misdemeanors are minor crimes• Felonies are more serious crimes

Page 10: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 10IS3350 Security Issues in Legal Context

Online Contracting

Underlying transactions are the same for online contracts and traditional contracts

Make transacting business easier Create problems for the contracting parties and

for the law Traditional law assumes the parties know one

another prior to entering into a contract Contracting over the Internet makes it unlikely

that they’re in the same state, geographical region, or even country

Page 11: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 11IS3350 Security Issues in Legal Context

Online Contracting (Continued)

Jurisdiction is an important issue for online contracts

Contract forms when the offering party receives an acceptance

People encounter special types of online contracts every day

Clicking on the "I Agree" button without reading or understanding agreement

Page 12: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 12IS3350 Security Issues in Legal Context

Online Contracting (Continued)

End-user license agreement (EULA) • Contract between the manufacturer or

distributor of a piece of software or a service and the end-user of the application• States how the software or service can be

used.• Contracts are accepted by removing the

cellophane wrap• Shrink-wrap contracts

Page 13: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 13IS3350 Security Issues in Legal Context

Cybercrime

Cybercrimes are crimes that use computers93% of all discovered data breaches were

linked to organized crime Identity theft and data theft is a multi-billion

dollar a year industryFederal and State laws created to address

cybercrimeDifficult to track the criminals

Page 14: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 14IS3350 Security Issues in Legal Context

Computer Fraud and Abuse Act (CFAA)

• Unauthorized access of security information

• Unauthorized access to protected computers

• Intentional transmission of malware, viruses, or worms that damage a protected computer

• Unauthorized trafficking of passwords or other computer access information

• Extortion involving threats to damage a protected computer

Page 15: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 15IS3350 Security Issues in Legal Context

EXPLORE: CONTEXT

Page 16: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 16IS3350 Security Issues in Legal Context

Cybertorts

Torts arising from Internet communicationsTraditional violations of intellectual property right Intentional infliction of emotional distress (IIED)Harassment can occur in cyberspaceCyber trespassViolating the right to privacy

Page 17: IS3350 Security Issues in Legal Context Unit 8 Cyberspace and the Law

© ITT Educational Services, Inc. All rights reserved.Page 17IS3350 Security Issues in Legal Context

Summary

General principles of contract lawContracts in cyberspace and online

transactionsGeneral principles of criminal lawCybercrimeTort concepts in cyberspace