Free example essay on Cyber Crime:
Information systems and technologies have become a vital component of successful businesses and organizations. Companies have spent billions of dollars to stay at the forefront of technology enhancements in order to enhance growth and expansion of their businesses and new ventures. To support these technology changes a company may require the assistance of Specialists in Information Technology Management, Human Resources, purchase of new equipment, installation, training, system maintenance, and the list goes on.
The majority of businesses would be unable to survive successfully in the marketplace without utilizing a variety of interconnected computer networks in order to service their information processing and communication needs. With all these changes, companies have a growing concern regarding security of systems information, abuses both internal and external, lawsuits and losses. But what is the exposure? Are there existing law suits? What should we do to protect our companies and ourselves?
Companies must take precautions to protect sensitive and confidential data from accidental or intentional leaks. They need to know how to limit legal liability and/or damage to the companies’ reputation from inappropriate or offensive e-mails and web surfing. Well-written policies and procedures can boost employee productivity and reduce network congestion.
In order to determine what needs to be done, we should understand the exposure companies face relating to Technology Information Systems. For example, EMC Corporation lost valuable sales contact information when an employee accidentally sent it to the competition via e-mail (The Boston Globe); an Oracle insider caused their stock prices to tumble after spreading false rumors on a message board (CNNfn); and Dow Chemical fired 50 employees and disciplined 200 others for sending e-mails containing pornography and violent images (Associated Press). Employees who surf the web are costing organizations more than $1 billion per year in lost work time (CNNfn). The U.S. Department of Justice, Computer Crime and Intellectual Property Section (CCIPS) recognized concerns regarding the Internet and the growing body of law governing it, and have recently published a document advising police and prosecutors on “Searching and Seizing Computer and Obtaining Electronics Evidence in Criminal Investigations.” The document includes framework applicable to the search and seizure of computer data and network traffic. In addition, it covers the Fourth Amendment’s limitations on search and seizure, the Electronics Communications Privacy Act, the Wiretap Act, the Cable Subscriber Privacy Act, and the Privacy Protection Act. Additional documented lawsuits and cases related to Technology Communications are:
· Cracking Concerns Over Cyber Crime Treaty (Galil, 2001). The Council of Europe wants a treaty to harmonize laws against hacking, computer viruses, and other Internet crime, as well as to ensure common methods of securing electronic evidence.
· Employers and E-mail – Where to Draw the Line (Galil, 2001). With the increase in workplace technologies, both employers and employees are wrestling with the balance of e-mail privacy expectations and the need for secure, productive work habits. The new Regulation of Investigatory Powers Act went into effect in Great Britain. This new regulation permits employers to monitor staff phone calls, e-mails and Internet activity without consent, and demonstrates that e-mail issues have become a global technology problem.
· Smyth v. Pillsbury Company (Galil, 2001). Smyth v Pillsbury is a case pertaining to e-mail privacy. A United States District Court in Pennsylvania ruled that the Pillsbury Company did not have to notify Mr. Smyth that his e-mails would be examined. The court reasoned that since it was Pillsbury’s equipment, the company was entitled to examine its contents.
· New York Times (Gaili, 2001). E-mail privacy issues have occurred at many well-known companies and employees are being fired over those little forwards that many of us send out each morning. On November 30, 1999, the New York Times Co. fired 23 employees who were accursed of contributing to a hostile work environment because they repeatedly traded unsavory batches of unsolicited personal e-mail messages that contained dirty jokes and nude pictures. The New York Times also reprimanded several more employees who had simply received the offensive e-mail and then deleted it. Those workers were punished for failing to alert management to the offending e-mail messages, a direct violation of company policy.
EffectivePapers.com is professional essay writing service which is committed to write great-quality custom essays, term papers, thesis papers, research papers, dissertations on any essay topics. All custom essays are written by qualified Master’s and PhD writers. Just order a custom written essay on Cyber Crime at our website and we will write your essay at affordable prices. We are available 24/7 to help students with writing essays for high school, college and university.