Mission Statement

The Rant's mission is to offer information that is useful in business administration, economics, finance, accounting, and everyday life. The mission of the People of God is to be salt of the earth and light of the world. This people is "a most sure seed of unity, hope, and salvation for the whole human race." Its destiny "is the Kingdom of God which has been begun by God himself on earth and which must be further extended until it has been brought to perfection by him at the end of time."

Thursday, January 2, 2020

Business Law (part 8)


Business Torts and Crimes (part D)
 by
 Charles Lamson

 Computer Crimes.  Computer crimes are crimes committed with the aid of a computer or because computers are involved. Under this definition, computers can be involved in crimes in various ways:
  1. They can be the objects of the crimes---such as when a computer is stolen or damaged.
  2. They can be the method of committing a crime---such as when a computer is used to make take money from an account.
  3. They can represent where the crime is committed--- such as when copyrights are infringed on the internet.


Image result for themis

Today, more and more businesses rely on computers, computer systems have become more interconnected, and an increasing number of businesses and private individuals use the Internet and the information on the Internet. As a result, more opportunities exist for criminal behavior. Frequently computer offenses can be successfully prosecuted by using existing criminal laws prohibiting theft, mail fraud, wire fraud, and the transportation of stolen property.

Some courts have refused to apply traditional criminal laws to computer offenses. Both the federal government and the states have responded to the need for laws that clearly apply to computer crimes by enacting specific computer crime legislation.

One federal law is called the Computer Fraud and Abuse Act. This act makes it an offence to, without authorization, access a computer or exceed authorized access of a computer used by or for the U.S. government or a financial institution and to (1) fraudulently obtain anything of value; (2) intentionally and without authorization obtain or destroy information; (3) affect the use of the computer; or (4) cause damage. It is also an offense to (1) deal in computer passwords and thereby affect interstate commerce; (2) knowingly access a computer, obtain national defense information, and disclose, attempt to disclose, or retain that information; and (3) transmit a threat to damage a U.S. government or financial institution computer in order to extort money from anyone. The punishment is a fine and/or up to 10 years imprisonment for the first offense and up to 20 years imprisonment for the second offense.

The federal government has also enacted a law called the Electronic Communications Privacy Act. This law prohibits the interception of computer communications, such as email, or obtaining and divulging without permission data stored electronically. 

Related image

The laws enacted by the states vary considerably. However, they generally prohibit alteration of a computer program or intentional, unauthorized access to a computer regardless of the reason for the access and the disclosure of any information gained by such access.

Criminal activity relating to computers can be classified as three types: trespass, fraud, and criminal copyright infringement.

Trespass. As applied to business crime, computer trespass means unauthorized use of or access to a computer. A trespass can range from being harmless to being a threat to national security. Such activities as merely using a computer to play games or prepare personal documents constitute computer trespass. More serious trespasses include learning trade secrets, gaining customer lists, and obtaining classified defense information. Computer trespass has been the focus of state computer crime laws.

A computer trespass may be committed in a number of ways, depending on who gains unauthorized access and the use made of the computer. The access might be by:
  1. An employee not authorized to use a computer in the business
  2. An employee authorized to use a computer who uses it for non-business purposes
  3. An unauthorized outsider who gains access to the businesses computer system---called a hacker
Since all computer trespass involves the use of computer time without permission, all trespass technically can be classified as theft of computer time. However, computer trespass causes even more serious problems. It ties up computers and prevents employees from doing their jobs and may reveal trade secrets, customers' personal financial records, or confidential medical information. Because computers house so much information, it is helpful that the computer crime laws of the majority of jurisdictions protect the confidentiality of all information stored in computers.

Image result for themis

One of the most highly publicized methods of trespass involves damaging computer systems by using rogue programs. A rogue program is a set of software instructions that produces abnormal or unexpected behavior in a computer. Various kinds of rogue programs have such colorful names as viruses, bacteria, worms, Trojan horses, and time bombs. They may cause computer users difficulty, inhibit normal use, or impose injury. The programs can be introduced to a computer by being attached to a useful program or even email they spread to other computers through modems, discs, or network connections. Once introduced, a rogue program can alter the operations of a program, destroy data or screen displays, create false information, display a message, or even damage the computer. 

Rogue programs may not show up for some time, so they can spread without alerting operators to their presence and damage all files in a computer system. One large computer software company inadvertently sent out copies of a software program containing a virus. The product had been accidentally infected after being loaded onto a computer that had received the virus from another program. In this case the virus merely caused a message to flash on computer users screens. However, the software company had the expense of recalling thousands of copies of its software program.

Fraud. As applied to computer crime, fraud encompasses larceny and embezzlement. It includes causing bank deposits to be credited to just one individual's account. Such an action might be prosecuted under traditional crime statutes or new computer crime statutes.

The use of the internet has made it possible for a wide variety of frauds to be perpetrated on unsuspecting businesses and individuals. Sometimes the internet provides an easy and inexpensive way to advertise a scam since so many people surf the web. A fraud can be easily advertised on the internet, such as the one in which a fifteen-year-old advertised computer parts for sale. Customers were required to pay cash upon delivery or buy a check on which payment could not be stopped. The box supposedly containing the computer parts would be empty and the perpetrator had the customers money.

Other internet fraud has included a long distance telephone company employee selling more than 50,000 calling card numbers. The employee was convicted and sent to prison. The Federal Trade Commission stopped an illegal pyramid arrangement after it's scam to participants of $6 million.

Computer criminals frequently target businesses, particularly large banks. Citibank lost $10 million, but recovered all but $400,000 when some Russians broke into its computer system and engaged in fraudulent transactions. Businesses frequently suffer losses quietly in preference to advertising to customers, stockholders, and clients that they are vulnerable to hackers, so it is impossible to accurately measure the dollar amount of loss to business from computer fraud. 

Criminal Copyright Infringement. In addition to civil copyright infringement, there exists the crime of criminal copyright infringement. In order to establish the criminal offense, the prosecutor needs to prove that (1) there has been copyright infringement, (2) the infringement was willful, and (3) the infringement was done for business advantage or financial gain.

As anyone who has used the Internet knows, it is relatively easy to copy material found on the net. The most serious problems for business occur when software is copied. Software that is copied illegally is called pirated software. Pirating software is a worldwide industry because the Internet links people all over the world. Software is sometimes copied without the owners knowledge and stored in someone else's computer located anywhere else in the world. Within a relatively short time people all over the world can make numerous illegal copies. If the owner of the computer used for storage finds out, the pirated software can be removed from the computer, but the copying has already taken place. Hundreds or thousands of copies of the pirated software could have already been made.

Finding software pirates can be extremely difficult, if not impossible. They could have used fake identification and nicknames or used an anonymous remailer. An anonymous remailer is a device that permits a person who has access to a computer and an email account to send messages and software to an email address or a group without the recipient knowing the source of the communication. The person who wants to send an anonymous communication sends it to the anonymous remailer. The remailer removes the identity and address of the sender and then sends, or emails, the communication to the address indicated by the sender. The recipient receives the communication with the remailers address on it. Some remailers keep a record showing the sender's identity, some communication can be traced. However, if the sender uses a remailer that does not keep such a record or uses several anonymous remailers, the communication could be impossible to trace. As a result, computer copyright infringement is, in dollar terms, the most serious crime on the internet. It has been estimated to cost copyright holders billions of dollars a year. 

Internet Resources for Business Law
Name 
Resources
Web Address
Legal Information Institute (LII)---Torts Law Materials
LII, maintained by Cornell Law School, provides an overview of tort law, including the Federal Tort Claim Act (28 USC 2671-80), recent Supreme Court decisions, and other information.
Computer Fraud and Abuse Act of 1986, 47 USC 1030
LII provides a hypertext and searchable variation of 47 USC 1030, Computer Fraud and Abuse Act of 1986.
Racketeer Influenced and Corrupt Organizations Act (RICO), 18 USC 1961
LII provides a hypertext and searchable version of 18 USC 1961, properly known as the Racketeer Influenced and Corrupt Organizations Act (RICO).
U.S. Patent and Trademark Office
Patent and Trademark Office (PTO) allows for a patent searches, as well, it provides formed, legal materials, and the PTO Museum.
Intellectual Property Center
This site, maintained by the University of Maryland University College Center for Intellectual Property, includes links to general resources, the Digital Millennium Copyright Act, Fair Use Standards, and International Issues and Resources. 
World Intellectual Property Organization (WIPO)
The World Intellectual Property Organization (WIPO) maintains the Berne Convention, Paris Convention (WIPO) Copyright Treaty, and WIPO Performances, and Phonograms Treaty, among others resources.
Copyright Office, Library of Congress
The Copyright Office provides publications and extensive information on copyright topics, including the basics of copyright law.

Related image

*SOURCE: LAW FOR BUSINESS, 15TH ED., 2005, JANET E. ASHCROFT, J.D.,PGS. 28-38*

end

No comments:

Post a Comment

As St. Paul gives witness to in his own life, "This is no longer my life, but Christ living in me." How do I witness Christ living in me?

Answer To witness Christ living in you, as St. Paul describes, involves both an internal transformation and an outward expression of faith. ...