Write Articles A community of people who love to write

The easiest domain name (Note the .ORG) - Absolutely Free!

Home | Submit Articles | Login   

What is Cyber Law and online rules of conduct.

BY: David Prakash Kumar | Category: Technology and Computers | Post Date: 2010-01-28

•    Read Comments

•    Print This Article

   David Prakash Kumar
Help others find this article:

Show All Social Bookmarks

Cyber Law?

Cyber Law is the law governing cyber space. Cyber space is a very wide term that includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. The law governing the cyber space should also encompass all these things and so cyber law can be very tricky. The cyber police should be very efficient to be able to trap the criminals in their act to make the law punish them.

Law encompasses the rules of conduct:

1. That have been approved by the government,
2. Which are in force over a certain territory, and
3. Which must be obeyed by all persons on that territory
Violation of these rules could lead to government action such as imprisonment or fine or an order to pay compensation.

Cyber law encompasses laws relating to:

1. Cyber Crimes, the crimes that are committed using computers in the internet or within an organization using computers.
2. Electronic and Digital Signatures that are used to forge various document . as if it was done by another person. This is usually done to swindle money unlawfully.
3. Intellectual Property and intellectual rights that are stolen by other people using the internet and computers.
4. Data Protection and Privacy.

Cyber crimes are unlawful acts where the computer is used either as a tool or a target or both. The enormous growth in electronic commerce (e-commerce) and online share trading has led to a phenomenal spurt in incidents of cyber crime. These crimes are discussed in detail further in this chapter. In fact the banking system has also started relying on internet and computers for all their transactions and work. This has made it possible for the criminals to use this avenue to make money quickly, easily and without a trace. A comprehensive discussion on the Indian law relating to cyber
Crimes and digital evidence is provided in the ASCL publication
Titled -Cyber Crimes & Digital Evidence - Indian Perspective-.

Electronic signatures are used to authenticate electronic records. Digital signatures are one type of electronic signature. Digital signatures satisfy three major legal requirements - signer authentication, message authentication and message integrity. The technology and efficiency of digital signatures makes them more trustworthy than hand written signatures.

These issues are discussed in detail in the ASCL publication titled -Ecommerce -Legal Issues-. Intellectual property is referred to as creations of the human mind e.g. a story, a song, a painting, a design etc. The facets of intellectual property that relate to cyber space are covered by cyber law from being used by other people unlawfully. This helps to protect the copyright of various intellectual properties on the internet.

Data protection and privacy laws aim to achieve a fair balance between the privacy rights of the individual and the interests of data controllers such as banks, hospitals, email service providers etc. These laws seek to address the challenges to privacy caused by collecting, storing and transmitting data using new technologies.

All these have made it very important for a person using internet to know about these cyber laws.

Article Source: http://www.saching.com

About Author / Additional Info:

Additional Articles:
* Learn the most important health benefits of eating mushroom
* Crackers for Celebration: Have crackers and fireworks become a public nuisance?
* Improving your communication skills: Become an effective speaker

Does this article violate or infringe on your copyright ?
It is a violation of our terms for authors to submit content which they did not write and claim it as their own. If this article infringes on your copyrights, then use our Contact us form with the detailed proof of infringement along with the offending article's title, URL and writer name. If you do not hear back from us then contact us again in another 10 days. Thank you.

Comments on this article: (0 comments so far)

* Additional comments are now closed for this article *
Comment Comment By Comment Date

Article Views: 5962

Page copy protected against web site content infringement by Copyscape
Copyright 2010 saching.com - Do not copy articles from this website.

Important Disclaimer: All articles on this website are for general information only and is not a professional or experts advice. We do not own any responsibility for correctness or authenticity of the information presented in this article, or any loss or injury resulting from it. We do not endorse these articles, we are neither affiliated with the authors of these articles nor responsible for their content. Please see our disclaimer section for complete terms.

| Home | Disclaimer | Xhtml |