{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

QUESTION

Week 11 Cyber Security   

There are two parts. You must answer both parts.
Part One. Take the fact pattern at pp. 3-4 of the Computer Crime Law casebook. (and recall the promise at note 5, p. 7: “… By the end of the book…”)

This exercise is open book and does not require any outside research beyond our as-signed texts, but you must make explicit reference to the texts as appropriate.

In your answers, you should make references to support your answers by informal pinpoint citation to book and page number within parentheses.

1.1. Offenses.
(a) What computer-related crimes or other offenses did Fred Felony commit when he decided to use a computer (this is the “computer crime” hypothetical, at p. 4). Briefly outline the ele-ments of each offense and be sure to distinguish which of these offenses is created pursuant to a new law and which of these offenses might be governed by more traditional laws.
(b) Do you believe the law as presently developed creates too many offenses, too few offenses, or just about the right number? Do you believe the law as presently developed has any signifi-cant ambiguities, gaps, or omissions? (briefly explain or defend your answers, even if you believe all is well)
1.2. Punishments
(a) What punishment or other remedy does the law provide for the computer-related offenses you identified in question 1.1(a) (felony, misdemeanor, or other [a stern chastisement? civil damages?]), and what are the likely sentences for any federal crimes? Briefly explain or defend your answer and if you need additional facts, please describe them and explain what difference they would make.
(b) Do you believe these punishments are too severe, not severe enough, or just about right? Do you believe that the punishments are subject to any significant ambiguities, gaps, or omis-sions? Briefly explain or defend your answer even if you believe the punishments are just about right.
Part Two. Take the Equifax settlement at pp. 389-90, note 8 of the Consumer Privacy and Data Pro-tection book.
2.1. Offenses.
(a) What offense(s) did Equifax commit? Briefly outline the elements of each offense, or offens-es if more than one.
(b) Do you believe the law as presently developed creates too many offenses, too few offenses, or just about the right number for such actions (or inactions)? Do you believe the law as pres-ently developed has any significant ambiguities, gaps, or omissions? (briefly explain or defend your answers, even if you believe all is well)
2.2. Remedies
(a) What punishment or other remedy does the law provide for the offense(s) you identified in question 2.1(a)? Briefly explain your answer and if you need additional facts, please describe them and explain what difference they would make.
(b) Do you believe these punishments or other remedies are too severe, not severe enough, or just about right? Do you believe that the remedies are subject to any significant ambiguities, gaps, or omissions? Briefly explain or defend your answer even if you believe the remedies are just about right.

NOTE: Although there is no page limit, do endeavor to be concise and to the point. It would seem that a fairly complete answer to each of these questions could be done in a page or two, or not much more than a few pages each at the most.

sources: attached
The “Casebook”: ORIN KERR, COMPUTER CRIME LAW, West (fourth edition, 2018) ISBN: ISBN-13: 978-1-634-59899-6.

“Solove” or “Data Protection Casebook”: DANIEL SOLOVE AND PAUL SCHWARTZ, CONSUMER PRIVACY AND DATA PRO-TECTION, Wolters Kluwer (third edition 2021) Softbound, ISBN: 978-1-5438-3259-4

 

 

 

Subject Computer Technology Pages 4 APA

Answer

Cyber Security

#1.1. a

Fred Felony committed computer misuse crimes when he hacked into the e-commerce site in Los Angeles to steal credit cards and sell them for $800 to another user. The law handling computer network scrutiny is mainly statutory, and the law controlling evidence retrieval from stand-alone computers is mainly constitutional. The physical crime Fred Felony committed of stealing gold from the jewelry stores is a traditional crime whose charges are presented under the state’s criminal codes where the offense happened, which is in Phoenix, Arizona. However, computer crimes alter the manner and where felonies are done and how and where proof is gathered. When the details alter, the law must adjust with it. Hence old rules must revise, and new laws must appear in restoring the operation of the pre-existing legislation (Kerr, 2018). since digital crimes can happen over different countries or states and the evidence is located in different places, the regulation must describe every sovereign what behavior types outside its boundaries can and should be criminalized, and what measures control extraterritorial proof gathering.

#1.1b

The laws presently developed create many offenses because executing the criminal legislation and procedures policy goals with legal directives relies on the facts. The digital crimes facts constantly challenge the suppositions of existing substantive, procedural, and jurisdictional legislation. The old legal rules can be started with, but after some time, some of the old directives need to bow, and others need substitution (Kerr, 2018). The law as presently developed has some gaps since digital crime law is the search for and learning of new answers to timeless criminal law questions when the facts shift from a physical setting to a digital one.

#1.2 a

Under the Computer Fraud and Abuse Act (CFAA), accessing a computer to defraud and get value as Fred Felony did attract a prison sentence of five years and ten years maximum for a second conviction. The federal anti-hacking law gives civil remedies for hacking victims such as property seizure, injunction relief, and confiscation of stolen data and the electronic devices utilized in performing the invasion.

#1.2 b

The punishments are just about right for that digital crime because the law comprises causes of action for civil suits together with criminal prosecution.

#2.1a

Equifax failed in patching its network after being notified in March 2017 by the Homeland Security Department of a crucial security vulnerability impacting its ACIS database, which handles clients’ inquiries concerning their personal credit information. Although the Equifax IT team ordered that each of its vulnerable systems is patched in forty-eight hours after getting the notification, Equifax never implemented this to guarantee the responsible workforce executed the order. Also, Equifax had a fiduciary duty of notifying affected clients that their personal information was compromised and try to remediate the situation. Equifax’s absence of patch management attentiveness and bland reaction to the directives to apply the patch to manage a known vulnerability was particularly accountable for the attack. Also, Equifax attempted to restrict the clients from seeking legal redress and damages.

2.1. b

The law as presently developed has the right number of such actions covered under section five of the FTC Act (Solove& Schwartz, 2021).  However, the law as presently developed has gaps because the FCRA falls short of executing detailed data security processes, necessitating only that credit reporting agencies be responsible for verifying persons’ identity requesting clients credit reports.

#2.2 a

The law’s remedies for data breach offenses are a $125 compensation and ten years free credit monitoring and $1,000,000 of identity theft insurance for the affected consumers.

#2.2 b

The remedies are just about right because these are the personal information of citizens. If accessed, the criminal uses the information to imitate somebody for different reasons like making fraudulent transactions or filing false income tax returns to embezzle tax refunds.

 

 

 

 

           

 

 

References

 

Kerr, O. S. (2018). Computer Crime Law (Introduction). Computer Crime Law (4th Ed. 2018), West Academic Publishing.

Solove, D. J., & Schwartz, P. M. (2021). Consumer privacy and data protection. 3rd Ed. Softbound, ISBN: 978-1-5438-3259-4

 

 

 

 

 

 

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?