Professional Documents
Culture Documents
The Internet is a collection of computer networks around the world that are connected
by telephone lines, satellites, fiber optic and coaxial cables, and wireless connections.
They communicate with each other using internet protocols. The Internet works a lot
like a postal system, except it is much faster. The Internet is a very dynamic structure,
when a person logs on to the Internet they are given access to many computers around
the world that are connected. With the help of the internet, there is a whole new sector
for trading of products and services and a virtual market is created; thus requiring
laws to be regulated.
Cyber laws illustrate the legal issues related to use of the internet as a tool for
communication. It is a discrete field of law when compared to property or contract
law, as it is an area that covers many aspects of law and regulation like privacy,
intellectual property, jurisdiction and freedom of expression.
Cyber crime is defined as a crime committed on the internet using the computer as
either a tool or a victim. It is a broad term that is used to describe everything from
electronic cracking to denial of service attacks.
Spam
Spam can be described as unsolicited sending of bulk email for commercial purposes
which leads to crashing an individual’s email account.
Fraud
Computer fraud is the false representation of facts that intends to make someone do or
refrain from doing something that causes loss. This includes altering computer input
in an unauthorized way, changing, destroying, suppressing, or stealing output, usually
to cover illegal activities, altering or deleting stored data, varying or writing codes for
fraudulent purposes. Other forms of fraud using computer systems include bank fraud,
identity theft, extortion, and theft of classified information
People may post content on websites or other forms of electronic communications that
may be distasteful, obscene or offensive for a variety of reasons.
Harassment
Drug trafficking
With the help of encrypted emails and other internet technologies to sell their
illegal substances, drug traffickers are taking advantage of the internet.
They finalize deals at internet cafes, swap recipes for amphetamines in
restricted access chat rooms, and use courier websites to transport illegal
packages of pills.
Cyber terrorism
Cyber Criminals:
The simple reason for this kind of behaviour pattern in children is mostly due to the
inquisitiveness to know and explore things.
Organised hackers
These kinds of hackers are mostly organised together to fulfil certain objective. The
reason may be to fulfil their political bias, fundamentalism etc.
These kinds of hackers are mostly employed to hack the site of the rivals and get
credible, reliable and valuable information. They may even be employed to crack the
system of the employer basically as a measure to make it safer by detecting the
loopholes.
Discontented employees
This group includes those people who have been either sacked by their employer or
are dissatisfied with their employer. As a means to take revenge they normally hack
the system of their employee.
In UAE
- Article No.2 of Law No.2 of 2006 considers any intentional act resulting in
abolishing, destroying or revealing secrets or republishing personal or
official information, as a crime. It says anyone convicted of logging onto
information website or system shall be punished with jail term, or fine, or
both. If the act resulted in abolishing, destroying, or revealing, changing or
republishing information, he/she shall be sentenced to no less than six
months in jail and be fined, or both. If such information are personal, a
fine of not less than Dh10, 000 shall be imposed, and a jail term of not less
than one year shall be handed out to the convict, or both punishments.
- Article No.6 says anyone convicted of inserting certain information via the
internet or using any IT or electronic mean for the purpose of stopping or
breaking down, or destroying, deleting or amending programmes and
information, shall be either jailed or fined, or both.
- Article No.7 says anyone convicted of using the internet or any electronic
or IT means for changing or destroying medical tests or medical diagnosis,
or medical treatment or healthcare, or even assisted others to do it, shall be
temporarily jailed or fined.
In Australia:
INTERNET USAGE:
Internet usage is filtered both in UAE and Australia depending on their respective
morals and policies.
In UAE, this filtering is done by the TRA. UAE has one of the world’s best internet
filtering system and is tested by universities like Harvard etc. because of its rapid
ability to filter sites in just moments. It is also one of the most difficult proxies to
bypass as it rapidly keeps blocking connections to servers allowing the bypass of the
UAE proxy server. Following is a list of the content deemed inappropriate according
to the UAE laws.
7) Internet Content for Hacking and Malicious Codes except for: Information
security including ethical hacking.
8) Internet Content that are offensive to Religions
9) Phishing Internet Content
10) Internet Content that downloads Spyware.
11) Internet Content providing Unlicensed Voice over Internet Protocol (VoIP)
service
12) Terrorism Internet Content
13) Prohibited Top Level Domain (TLD)
In Australia, the internet filter is governed upon by the Broadcasting Services Act
1992, under which the sites with the following online content are prohibited:
This shows that Australia’s main motive is to block adult content only from children
and give the general public complete freedom of choice.
VoIP
VoIP or Voice over Internet Protocol is a technology that allows you to make voice
calls using the internet instead of a regular phone line.
In other words, the law prohibits the use of “VoIP Services” where:
The only exception to the general prohibition i.e. VoIP Services are permitted where:
• the VoIP Services are provided by Etisalat or Du (the licensed
telecommunications providers in the UAE);
• An entity’s Private Network entirely provides the VoIP services; and
• All above mentioned VoIP calls are local i.e. originate and terminate inside the
UAE.
Even though the TRA’s Policy has not specified the penalties applicable to an entity
who has unlawfully used VoIP Services, it has given a wide collection of penalties
that may be imposed on the accused for “unlawfully using Telecommunications
Services without authorisation”. These penalties include imprisonment for up to two
years, fines of between AED 50,000 and AED 200,000, and confiscation and possible
destruction of any equipment used in breaching the Telecom Law.
These include :
Thus, the Australian law is very lenient and VoIP is allowed over the public internet.
Copyright
What is Copyright?
It is a form of intellectual property for which the maker or the creator has exclusive
rights over the property for a limited amount of time related to its work which
includes publication, distribution and adaptation. After being used, the material is said
to be in the public domain.
Copyright is applied to any expressible form of an idea or information that is
substantive or important and discrete. Some authorities also recognise "moral rights"
of the creator of a work, such as the right to be credited for the work.
The people believe that if a material has no copyright notice, is not copyrighted.
Majority of the countries follow the rules and laws set by The Berne Copyright
Convention. One of these laws stated that everything created privately and originally
after April 1, 1989 is copyrighted. Hence, all Internet users must presume that the
material is copyrighted, unless otherwise stated by the author or creator.
Copyright laws :
UAE:
The first Copyright Law of 1992 was enforced on 1st September 1994 and
enforcement has continued ever since.
The United Arab Emirates has its own Ministry of Information and Culture which
provides intellectual property copyright to any innovative literary, scientific or artistic
work. These works are then filed at authorities in the Ministry, and are used as
reference later if needed.
Not filing a work by the creator does not lead to any violations of the copyright law.
Only the author has the right to amend or change any of his works in whichever way
he deems them to be fit. The copyright lasts for 25 years from the year of the author’s
death.
Australia:
Copyright protection in Australia is provided under the Copyright Act
1968 and it gives exclusive rights to license others in regard to copying the work,
performing it in public, broadcasting it, publishing it and making an adaptation of the
work. These rights then differ according to the nature and importance of the material
or work. Making copies of copyrighted work is illegal, but a certain amount of
copying is allowed by the Australian law. Also the law does not protect the creator
against creation of similar work by another individual.
The duration of the copyright varies from the nature of the work.
Copyright for the material generally lasts 70 years from the year of the author's death
or from the year of first publication after the author's death.
PIRACY:
Unauthorized copying, downloading, sharing, selling, or modification of
electronic media on the internet is often referred to as piracy. Piracy is a day-light
robbery and mainly takes place in software’s.
When an individual buys software, he has a legal license to make use of the software,
but not install it or copy it more than the number of times specified by the license.
By doing this, he is committing piracy.
Digital Piracy:
Digital piracy is the illegal repetition and distribution of copyrighted content
through electronic means. This type of piracy is largely committed in P2P (Peer-To-
Peer) networks, because they host copyright protected audio, video and picture files
on web servers. This data is also uploaded to video sharing sites and is distributed
illegally through e-mail or instant messaging. Canada is the only country which
protects it users against P2P Copyright Claims.
Internet Piracy:
Internet Piracy occurs when the software is unlawfully downloaded
from the Internet. New media files are available on the internet websites as soon as
they come in the market, and users downloading the file are doing it against the law
and are unintentionally becoming cyber-pirates.
Pirate Websites are those which offer counterfeit, duplicate, used or infected software,
also networks like P2P that allow transfer of copyrighted materials are also illegal
because it hosts works created by someone else, and this is then downloaded by other
web-users, making them fall in the trap of piracy.
Effects of Piracy:
Pirated software and media files lead to consumers, software developers, and
resellers getting harmed. These people run the risk of infecting their computer with
viruses from these counterfeit software’s leading to hard disks getting corrupted and
important data being lost.
The pirated software does not come with appropriate documentation, so the user
cannot enjoy full benefits of the software package, and he is not able to take
advantage of technical support and software upgrades and bug fixes. These benefits
are only enjoyed by customers who have legally and legitimately bought their
software.
When software is pirated, developers run into a lot of loss as counterfeit copies of
their works are easily available for a cheaper price in the market. Software developing
companies look to regain their revenue by selling their software, but if most of it is
pirated and widely sold over the internet, this leads to the company going under major
loss which cripples the research and development of improved software. Also due to
the lack of sale in products, the developers lose revenue which hinders development
of new software and stifles the growth of the software company.
Penalties:
UAE:
A person or organization which publishes a work not owned by them without
getting a legal permission from the original creator’s of the work, will be punished
under Article 38 of the law which states that the person will be punished with
imprisonment and with a fine of not less than (50000) Fifty Thousand Dirham’s, or
with either both penalties. The person, who claims, contrary to the truth, that he is the
owner of a work, shall be punished with the same penalty.
Any person who amends the subject or the nature or the title of the material is subject
to be punished with imprisonment and with a fine not less than (10000) Ten Thousand
Dirham’s or by either of these penalties. Copying, printing or publishing these works
leads to the same penalties. If a store is selling or distributing the works without a
written consent from its author then it’s a violation and the violator will be punished
with imprisonment or with a fine not less than (50000) Fifty Thousand Dirham’s, or
with either of these penalties.(Article 42)
Australia:
Changes were implemented to the Copyright Act in 2004 as part of the
implementation of the Australia-United States Free Trade Agreement (AUSFTA).
Due to this agreement, its strictly forbidden be copying and pirating software within
use in businesses or just to gain commercial advantage, such an act would face
penalties ranging from maximum fines and imprisonment.
A person infringing on copyright protected work can be sued by the copyright owner
and taken to court. A court can order a range of things, including that the infringer pay
compensation and pay the copyright owner's costs.
In some cases, a person who infringes copyright can be charged by the police, and can
be ordered to pay a fine or, in serious cases, jailed.
Case:
In September 2005 Wilcox J delivered a comprehensive judgment in Universal Music
Australia Pty Ltd v Sharman License Holdings Ltd [2005] FCA 1242 involving the
peer-to-peer file sharing system known as Kazaa.
The applicants made claims of copy right infringement, contravention of the Trade
Practices Act and conspiracy. Wilcox J held that the evidence did not support either
the Trade Practices Act or conspiracy claims.
E-Commerce:
As the name suggests, this section deals with the issues regarding online business
transactions. When we are entering an online transaction, we are not in physical
contact with the opposite party, so there is no tangible proof for their authenticity. In a
real life situation, a transaction would require handwritten signatures of the parties.
Similarly in the digital realm, each site has their own electronic signatures,
which a proof of the parties existence and provides assurance. These electronic
signatures are recognized by countries globally. As our scope of research is limited
only to UAE & Australia; we have:
In UAE,
The electronic signatures are regulated by Federal Law No. 1 of 2006 on
Electronic Commerce and Transactions (the "Act") was published in the Official
Gazette of the United Arab Emirates, Volume 442, 36th year, Muharam 1427
H/January. The key objectives of the TRA are to license, monitor, approve, and
oversee the activities of Certification Service Providers and to continue providing
strategic advice to current and new stakeholders who choose to conduct business
online
In Australia,
The Commonwealth Electronic Transactions Act 1999 was formed for
the support and encouragement of e-commerce in Australia. It contains rules applying
to the interpretation of other legislation.
Basically, it states that a transaction under a law of the Commonwealth will not be
invalid simply because it was conducted by the use of electronic communications.