Friday, August 21, 2020

Computer Theft - An Example Paper

Computer Theft - An Example Paper Computer Theft An Example Paper Computer theft is a field that has been growing recently over many areas and sectors. Many people are losing items of value and money through this crime leaving many bankrupt. The authority has been trying to curb the vice but with minimum progress which has left many people with fear on what would happen if they became victims of the crime. The areas mostly affected by this computer theft are the financial institution where most cards are hacked by intelligent criminals who have skills in the act over time now. Other unlawful conduct related to this crime is internet fraud for material benefits, ‘interference of commerce robbery’, theft of trade secrets and others. This paper will study how the unlawful conduct has been developing over time covering the history of such development, analyzing cases or laws at work to curb it, the points of view that could be available from contemporary debates, and the summary of this paper will be outlined at the end to give a concrete understanding of the major discussions points. Development of computer theft In 1980’s the law enforcement agencies got concerned about what was happening in the computer industries, and there were no laws that were available to fight the outlined crime which left people suffering all over from the unlawful conduct. Mail fraud and wire provision were available for ‘federal criminal code’, but could not be able to solve the problem that the world was undergoing about the computer theft. In the year 1984, a major development took place on prevention of the same crime which resulted to “comprehensive crime control Act of 1984”. The above Act helped to protect computers from unauthorized access by third parties. Later in the year, the congress made initiatives to determine whether there was a possibility to revise the existing federal law on the case of computer crime including theft. In year 1985, the senate and House held a major hearing on computer bills which were meant to help fight the crime. Major progress were experienced from the computer indus try with great sophistication and existing prosecutors gained more experience in the outlined CFAA which faced major developments and amendments from year 1988 to year 2002. Law and cases dealing with computer theft crime There are unlawful conducts associated with computer crime that have been governed by applicable federal laws. Extortion is an unlawful conduct experienced in the industry of computers which is governed by federal law 18 U.S.C 1030 which is stated as’ interfering with commerce by robbery, extortion threats or violence’. Another unlawful conduct is internal fraud which is governed by federal law 15 U.S.C 6821 which is ‘fraudulent access to financial information’. Credit card fraud is another conduct which is governed by federal law 15 U.S.C 1644 which is ‘credit card fraud aggregating at least $ 1000’. Intellectual and piracy property theft is a discouraged act governed by federal law 18 U.S.C 1831, 1832 which is ‘theft of trade secrets’. Points of view in contemporary debates A major computer associated congress that took place in 1984 was mainly for purpose of addressing the computer crime which had been a problem to the nation and states for a long time where none of the other laws was able to fight it successfully. The point addressed in the congress was on protection of unauthorized third party to other peoples computers. The other access that was addressed was of computer networks which was highly rampant in those times and had to be addressed. The congress organized was not supposed to add any new law, but was to help in addressing the crime in a single statute which was supposed to be unique. In the year 1986, a hearing was organized and undertaken by the congress which resulted to arise of ‘computer fraud and abuse Act’ (CFAA). All the three happenings were meant to address the problem of computer crime which was becoming rampant in the society leading to losses on finances by many people. Conclusion Computer crime is a very serious and risky crime to business people and other people in general since it can lead to huge losses and eventual bankruptcy. It is experienced everywhere in the world, and not much has been done to alleviate it completely. Several developments have been done in the legal field to fight the vice, but it has remained intact in line with the sophistication experienced in the field of computers. Several federal laws have been established to fight the computer crimes, but have not fully addressed the issue leaving the society with no much of the option other than to protect them in any way possible. Several initiatives have been established to try solving the problems of computer crime which have been developing and growing every day with new techniques and methods. The problem can only be controlled since every new way established to fight it comes with a new method to avoid it in return.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.