Free Essay SamplesAbout UsContact Us Order Now

Technology and the Law

0 / 5. 0

Words: 275

Pages: 1

92

Technology and the Law
Name
Institution
Course
Date

The law seems to be behind what is happening in the modern world. The law enforcement needs to be updated to curve the technology crimes that are on the rise. The law is just catching up, through staffing of qualified personnel. Currently the police lack necessary expertise and skills. The other factor making it difficult to investigate and prosecute digital crimes is the nature of the evidence. Unlike the other real-life crimes, digital evidence is a collection of figures and codes put together, radio signals or waves. Information existing in this nature can be easily corrupted, edited or lost hence making it impossible to apply the law on search cases. For cyber crimes its impossible to protect the integrity of the evidence because even if the investigator attempts to examine the evidence he or she will have contaminated the evidence already. In some cases, the offenders set their computers in a way that they automatically delete the evidence of accessing some sites. For example, individuals who carry out cybervandalism or hacking of delete all the logs that can be used to prove that they intruded a certain system (Moore, 2014).
There is a need to implement additional information focused laws. Some of the laws such as Computer Misuse Act that regulate the online crimes by creating a life imprisonment penalty for digital criminals are not enough. The digital crimes have increased despite the rules, therefore, affecting many businesses.

Wait! Technology and the Law paper is just an example!

Such law should be replaced with a law that permits businesses to be insured under a cyber-insurance with well-revised regulations. The best approach that protects individuals from privacy in the European Union is the General Data Protection Regulation (GDPR). This is because it covers the collection of data and information for all the citizens of the European Union (Moore, 2014).
Developed countries like the United States and the European Union have adopted various policies and regulations to see that information privacy is maintained. Technology firms are required to prepare programs installed with privacy settings in the software structure. Incorporating features that guarantee the rule of data privacy is not violated by anybody.
In England, National Cyber Crime Unit is a national body with a specialist that is responsible for handling all the cybercrime threats. In the United States, various states have adopted certain logical approaches to curve cybercrime. They have multi-agency: technology task force. These task forces work together as multi-agencies as it’s required by those who fund their activities. They include the Secret service and the FBI (Moore, 2014).

References
Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.

Get quality help now

Lora Higgins

5.0 (236 reviews)

Recent reviews about this Writer

Not even a single mistake in my research paper. What else could students dream about? Of course, I got an “A”, and I’m absolutely happy with this company! By the way, their 24\7 customer support is just amazing.

View profile

Related Essays