Screen shot 2021 05 05 at 1.28.01 pm

Cybercrime and the Law

  • Creation of Cybercrime

    According to researchers that suggest that cyber crime such as hacking begun on the years of 1950s.
  • Federal Communication Act

    After finding out that citizen were being victimized by hacking. The legislation first attempt to prosecute unauthorized computer access under the preexsiting property crime status.
  • Communication Decency Act

    President Bill Clinton signed into law the Communications Decency Act referred to as CDA. which is enacted in order to protect minors from harmful material on the Internet.
  • No Electronic Theft Act

    the reason why this law was passed in order to criminalizes the willful infringement of copyrighted works, including by electronic means, even when the infringing party derives no direct financial benefit from the infringement
  • The Digital Theft Deterrence

    The Digital Theft Deterrence and Copyright Damages Improvement Act of 1999 increased the amount of damages that could be awarded in cases of copyright infringement—a crime that is intimately associated with software piracy
  • The Cyber Security Enhancement Act (CSEA) of 2002

    When creating this law, the legislation wanted to consider not only what financial loss was caused by computer crime, but also what level of planning was involved in the offense, whether the crime was committed for commercial or private advantage and whether malicious intent existed on the part of the perpetrator
  • The Cybersecurity Information Sharing Act of 2015

    The legislation applied this law in other to have the U.S. government have access with internet sharing information between the government in the US and manufacturing companies such as AT&T, Verizon, etc. With the full purpose to make it easier for private companies to quickly and directly share personal information with the government, especially in cases involving specific cybersecurity threats.
  • Clarifying Lawful Overseas Use of Date

    the reason for this law was to make clear that all warrants, subpoenas, and court orders apply to all data within a provider’s possession, custody, or control, regardless of whether the data is stored inside or outside the United States. In order for these data to be admissible in the court of law.