top of page

More On Internet Law

 

Cryptography

 

Cryptography is another way of handling sensitive information. It involves the encryption and decryption of data. It involves a code that is only known for both the recipient and sender. In case a file reaches an unauthorized person, it cannot be opened unless the security system is encoded. The illegal decryption may take a while and the time may already notify the sender to take some actions. This technology ensures that personal information remain secure and private.

 

​It is highly recommended for businesses sharing sensitive data like financial statements. Hackers target them with the intention to rob money.

 

Types of Cyber Crimes

When man invented the computer, he never thought that it will be flooded with crimes. Cyber crimes are generally criminal in nature. They come in different ways. Cyber squatting, phishing, spoofing, cyber stalking, cyber defamation, net extortion, pornography, email bombing, identity theft and data hacking are just some of the most usual offenses done in the net. They involve illegal access and, data interference, system interference, interception, electronic fraud and misuse of devices. These actions cause tremendous damage to you and to other users. Many businesses shut down, huge money is lost and reputation is damaged every day because of these offenses.


Authorities constantly improve their detection and infiltration abilities to prevent these illegal activities. However, their action is still not sufficient. The full cooperation from authorities and individuals, the extent of illegal works and the costly legal proceedings make the work more challenging.


Problem With Internet Law
One major problem with internet law is the coverage of jurisdiction. This is an aspect of state sovereignty.  Not all countries and state implement the same rules.

​This is problematic since the internet does not recognize territorial limits. Cyber criminals easily get away with the punishment when one country fails to participate in the prosecution.

The ruthless offenders exploit this problem and hide their tracks by using complex layers of website administration across different continents. Legal practitioners are also left with a conflict of law issue.

Certainly, jurisdiction has its tricky area. But the rule dictates that although the net has no physical jurisdiction, the criminals are bounded to geographical boundaries and are subject to laws.


Conclusion
Today’s electronic age has extended the crime beyond physical assaults. The offenders have become boundless to territorial limits. They inflict harm to anyone who is left unguarded. It is true that the cyber world opened a limitless world but it also opened several opportunities for abuse.

Everyone should take active action to safeguard properties and their reputation each time they enter internet. Whether you are directly or indirectly using computers, security should be an integral part of your electronic life.

The government continues to pursue ways on how to help fight cyber crimes but definitely, they cannot do the work on themselves. With the millions to billions of people under them, do not expect a 100% protection. They need you to be vigilant. Unless you help safeguard yourself, you will always be vulnerable to criminals.

BE SAFE
• Avoid giving personal information such as your address and phone number to someone you do not know.
• Avoid opening emails from unknown sources unless you do online marketing.
​. Do not open attachments sent to you from unknown sources.
• Avoid online friendships with unknown persons of dubious character.
• Be careful who you meet in person who you've met online.
• Tell someone else about any bad Internet experiences you are having online especially if you are a child.

Consumers Page

Internet Security, Computer Safety, Product Reviews.

bottom of page