Free Essay SamplesAbout UsContact Us Order Now

SP-Unit 14

0 / 5. 0

Words: 275

Pages: 1

79

Student’s name
Professor’s name
Course
Date
THE LEGAL SYSTEM AND ETHICS IN INFORMATION
1. Laws and statues provide protection for our computer usage (Hanrahan, 14). This is put in place to discourage any form computer crime that is being recorded daily. They include;-
Individuals who are found in possession and accessing a computer device by cracking the password or access code will be penalized and prosecuted for fraud as the law stipulates.
Individual are discouraged from interrupting any communication lines and Internet access. If found, he/she will be charged according to the laws put in place.
The government has the right to access to any electronic device to access the information of a particular custom. This is when it’s a matter of state urgency
2. The challenges that the legal system are facing include-;
Rapid technological advancement: -technology is evolving each day, and a better version of the previous one come out almost every day. This increased technological development i.e. applications and new protocols (Beckman, 6). As a result, when a problem occurs, it won’t even be known after laws will be required to address these issues. Ironically, implementing the law takes time. This would have led to another invention. The other challenge is technological inept legal personnel. In this case, we don’t have a legal team having adequate knowledge on computer and computer related technologies. The most challenging part is trying to equip the jury and the legal personnel on matters about computer knowledge and its application.

Wait! SP-Unit 14 paper is just an example!

Jurisdiction is also a major challenge (Beckman, 11). This is because, in computer networking and computer security, an individual is in a position to remotely log in into computer ‘B’ using computer ‘A’ and commits the crime in country ‘D.’ The criminal will then send packets to either country ‘E,’ ‘F,’ ‘G’; in this case, the question arises as to which country is the criminal going to be prosecuted.
3. Ethics in security
Ethics are more of objectives, the social standard that are set with regards to computer use (Reynolds, 23). These ethics enables a proper functioning and use of the computer. The ethics to abide by include;-
One should not use a computer to harm others-this may include sending an inappropriate message or installing a virus on one’s computer.
The computer should not be used to steal or commit any crime like cyber-crime, stealing money from a bank or important data and selling it to cartels.
You should not snoop around people’s computer to view their files. This is done to ensure privacy.
Thou shall not use computer to bear false witness-some individuals can hack into computer based evidence to provide false information and become a false witness
References
Hanrahan, Clare. Legal System. Detroit: Greenhaven Press, 2008. Print.
Beckman, James. Comparative Legal Approaches to Homeland Security and Anti-Terrorism.
Aldershot, England: Ashgate Pub, 2007. Internet resource.
Reynolds, George W. Ethics in Information Technology. Boston, MA: Course Technology,
Cengage Learning, 2010. Print.

Get quality help now

Top Writer

Sam Cooper

5.0 (194 reviews)

Recent reviews about this Writer

I am impressed with the professionalism and quality of service at studyzoomer.com. The essay writer delivered a well-researched and well-written essay that exceeded my expectations.

View profile

Related Essays

Common Essay

Pages: 1

(275 words)

Might Have Been an Inside Job

Pages: 1

(275 words)

cyber-security

Pages: 1

(275 words)

Go to paper instructions

Pages: 1

(275 words)

Sierra Leone Analysis Matrix

Pages: 1

(275 words)

Money stock

Pages: 1

(275 words)