Law

Read Complete Research Material



Law



SCHOOL OF LAW

COURSEWORK FOR (Name of Subject)

AUTHOR -(Name and Student Registration Number)

DATE - (Date Of Submission)

SEMINAR GROUP -(Group Number)

SEMINAR TUTOR -(Name of Tutor)

SCHEME -(eg LLM)



(Law)

I hereby claim that this paper is my own work and it has not been taken with or without permission from elsewhere i.e. copied from anywhere, that I have not colluded with another in the preparation of this work (unless permitted) and that any extracts from books, papers or other sources have been properly acknowledged as references or quotations. I also certify that I have checked the settings of my work before submission to ensure that I have complied with the template instructions. If this is untrue I acknowledge that I will have committed an assessment offence.

Signed: ______________________________________ Date:_______________________

Table of Contents

Introduction2

Discussion3

Computer crimes:4

Law on the Computer Misuse (Computer Misuse Act):6

Spam, malware, and the law:8

The European Convention on Cybercrime:9

Personal safety on the Internet:10

Debates relating to Cyber Laws:12

Conclusion13

Bibliography14

Law

Introduction

The nature of the threat to companies and individuals coming from malicious software that radically changed over the time elapsed since the appearance of the first virus in 1986. The technology has since advanced and penetrated virtually all spheres of our lives. The development of online markets has changed the motivation of malware authors, and there was the "shadow economy" in which malicious software and personal data are bought and sold on a commercial basis. Despite the fact that the provisions of the laws of a general nature that can cover the widest range of existing and future offenses, the legislation usually lags behind reality, due to the rapid development of technology. Not the fact that the laws adopted to combat involved in the spread of viruses and hacking of computer systems that are effective against today - much more complex - malware designed to steal data, send spam, and the output of computer systems fail.

Understandably, with such a new subject area, the portfolio of cyber law literature is expanding and as this entry is published a number of substantive texts covering various emerging aspects of the subject are in the process of being written. The main body of current literature on cyber law tends to consist of UK edited collections, which are of an overall high quality, but individual sections can vary in quality, as tends often to be the case with edited texts. The objective of this article is to give an overview of the provisions of UK legislation relating to computer crimes along with discussing the Data Protection and Cyber-Security with reference to the law in UK.

Discussion

The Internet is largely unregulated and entirely free of central content regulation. Its technological development from DARPANET has ensured this. This is not to say that governments are utterly unable to regulate content. The Chinese government has invested heavily in the so-called 'great firewall of China' which is designed to keep undesirable (by Communist lights) material out. Popular chat spaces in China have a series of banned words and phrases, such as 'Tibet independence' and 'Tiananmen ...