Various Computer Related Laws Essay

Total Length: 631 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2

Contending With Cybercrime Issues

Attacks and Malware

There are numerous laws pertaining to identity theft, privacy, and cybercrime. Prior to designating those laws and their ramifications for the parties involved with a breach, it is sapient to provide a brief overview of the correlation between these three facets of laws. One of the more common means of engaging in identity theft is through the means of cybercrime, in which individuals typically hack into a computerized systems and take personally identifiable information of others and use it for their own illicit purposes. Additionally, such crimes intrinsically invade the privacy of others and intrude upon that privacy by preventing individuals to keep personally identifiable information and other aspects of their lives private.

One of the most salient of the laws relating to these three different aspects of theft in contemporary times is the Fair and Accurate Credit Transactions Act of 2003. This law not only provides for free disseminations of one's credit report in the U.S., but also provides for alerts on credit history in the case that a breach does occur. It also has strict provisions for discarding credit information in way that helps protect consumers. The Identity Theft Protection Act of 2005 has numerous measures to reduce the risk of identity theft and to protect consumers when such an occurrence takes place and their privacy is subjected.
These include restrictions on how social security numbers are used and obtained, and the rights of individuals whose personally identifiable information is compromised to be notified of such activity (North Carolina Department, 2005). It also enables consumers to sue for civil damages in the event of breach, and to put holds on their credit information during times when such activity has taken place or is suspected. Again, it is pivotal to note that the laws discussed in this document enable citizens to recoup monetary damages incurred from identity theft.

Identity Theft

Software attacks, commonly referred to as malware, are becoming increasingly common and take a number of different forms. Some of the more popular ways of implementing these attacks involve the usage of viruses. Viruses are malware attempts that infiltrate various software that one has on one's computer. Once they infiltrate that software, viruses generally produce abnormal and noxious behavior that can take virtually any form, and require individuals to get their machine vaccinated. Another form of malware is known as Trojan Horses.….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Various Computer Related Laws" (2015, August 24) Retrieved June 30, 2025, from
https://www.aceyourpaper.com/essays/various-computer-related-laws-2152544

Latest MLA Format (8th edition)

Copy Reference
"Various Computer Related Laws" 24 August 2015. Web.30 June. 2025. <
https://www.aceyourpaper.com/essays/various-computer-related-laws-2152544>

Latest Chicago Format (16th edition)

Copy Reference
"Various Computer Related Laws", 24 August 2015, Accessed.30 June. 2025,
https://www.aceyourpaper.com/essays/various-computer-related-laws-2152544