Cyber Law, which may be classified as “Computer Law”, is
considered to be one of the most recently developed legal fields as a result of
the ongoing advent of computer-based technology. This type of technology relies
heavily on the Internet and online activity, and as a result, regulations and
oversight of this type of activity has been expressed in the spectrum of Cyber
Law. Cyber Law is a fairly expansive legal field that consists of a variety of
avenues and jurisdictions, including the ethical and moral use of the Internet
for lawful and legal purposes.
Types of Cyber Law
Cyber Law and Computer Law
Cyber Law within the scope of Computer and Cyber Law may be
identified as a form of criminal activity that is facilitated through the usage
of electronic, network, and technologically-based communication systems. These
systems rely on the Internet as a means of online communication. Cyber Law can
range from lawful Internet usage to the regulation of electronic correspondence.
Identity Theft is the criminal act of deceptively assuming the
identity of another individual without his or her expressed consent. Those who
commit identity theft do so with the intent of committing a crime. Fraudulent
and illicit obtainment of personal information through the usage of unsecured
websites can be prosecuted through Cyber Law.
Hacking is the unlawful entry into the computer terminal,
database, or digital record system belonging to another individual. Hacking is
conducted with the intent to commit a crime.
Within the scope of Cyber Law, a computer virus is a program
created to infiltrate a computer terminal belonging to another individual with
the intent to cause damage, harm, and destruction of virtual property.
Spyware are computer programs facilitating the unlawful
collection of data, allowing individuals the illicit access to the personal and
private information belonging to another individual.
Phishing is a criminal act of fraud involving the illegal and
unlawful attempt to obtain restricted, unauthorized, and privileged information
through means of fraudulent and communicative requests. Spam is defined as a
digitally-based criminal instrument, which involves the unsolicited
transmission of electronic communication with intent of committing fraud.
Copyright Law and Cyber Law
Cyber Law prohibits the use of Bit Torrent technology,
Peer-to-Peer network file sharing, and any other means of the unlawful,
unauthorized transmission of digital, copyrighted media and intellectual
Cyber Law defines traditional file-sharing programs as means in
which to circulate complete digital media files through digital transmission.
Cyber Law defines Bit Torrent and Peer-to-Peer file sharing as
the collective, segmented transmission of digital media through its server(s).
Sex Crimes and Cyber Law
Online Sex Crimes in the scope of Cyber Law are defined as the
participation or engagement in sexually-predatory or sexually-exploitative
behavior through the facilitation of the Internet, which may include:
The ownership, transmission, or receipt of illicit and illegal
pornography, ranging from bestiality to child pornography;
The solicitation of minors or those below the age of consent to
participate in sexual activity. This can range from physical sex crimes to
virtual sex crimes.