You are on page 1of 5

LYNDA VIMBAI GONESE

ND3 – PART-TIME

Spoofing

Unlawfully accessing a computer without authorization and sending multiple e-mails;


resending multiple commercial email messages with the intent to deceive recipients; or
falsifying header information in multiple email messages. Spam and its decedents are not
only extremely annoying; they are federally outlawed. Don’t repeat your passwords on
different sites, and change your passwords regularly. Make them complex. That means using
a combination of at least 10 letters, numbers, and symbols. A password management
application can help you to keep your passwords locked down.

Accessing Stored Communications

Intentionally accessing, without authorization, a facility through which an electronic


communication service is provided. Hacking someone's email account for the purposes of
commercial advantage, malicious destruction, or in furtherance of any crime carries a
maximum five-year sentence for first time offenders. Hacking into an email account in all
other cases comes with a maximum one-year sentence. Always keep your computer up-to-
date with the latest version of any program you have on it. If you don't, it can create
security holes.

Sports Betting

Engaging in the business of betting or wagering on any sporting event or contest over the
Internet. Using the Internet for betting on sports is a federal crime punishable up to two
years in prison. States remain free to regulate internet gambling, other than sports betting,
as it occurs within that state. Since non-sports betting regulations fall within the purview of
the individual states, the laws and regulations vary across the country. It is advisable to
engage sport betting which is legal and with all necessary documentation e.g. Sport betting.

Non-Delivery of Merchandise

Devising any scheme to defraud, or for obtaining money or property by means of false or
fraudulent pretences, or promises, and using the Internet for the purpose of executing the
scheme. This statute covers general wire fraud, but also applies to the most common
scheme of not receiving what you won and paid for in an online auction. People should by
from registered online merchandise as Ali express.

Black mail Know that identity theft can happen anywhere. It is smart to know how to
protect your identity even when traveling. There are a lot of things you can do to help keep
criminals from getting your private information on the road. These include keeping your
travel plans off social media and being using a VPN when accessing the internet over your
hotel’s Wi-Fi network.

Child Pornography

Using the Internet to transmit child pornography. Under federal law, transmitting child
pornography carries a minimum five-year sentence and a maximum 20-year sentence. Just
like you will want to talk to your kids about the internet, you will also want to  help protect
them against identity theft. Identity thieves often target children because their Social
Security number and credit histories frequently represent a clean slate. You can help guard
against identity theft by being careful when sharing your child’s personal information. It is
also smart to know what to look for that might suggest your child’s identity has been
compromised.

Access for fraudulent purposes

Other states have laws that punish using a computer to accomplish a fraudulent act. Some
states, for example, make it a crime to use a computer, computer software, or computer
network to fraudulently obtain goods or services of any kind.

Drug Trafficking

Delivering, distributing, or dispensing a controlled substance by means of the Internet. Using


the internet to violate the federal drug trafficking law carries a hefty sentence depending on
the drug and the amount. For example, one kilo of heroin gets you as much time as five kilos
of cocaine: imprisonment for a minimum of 10 years with the max being a life sentence.
Also, if death or serious bodily injury results from use of the drugs, the minimum sentence
gets bumped up to 20 years. It is advisable to always search your bag before travelling.

Unlawful use or access

Some states have laws that make it a crime to use or access a someone else's computer
without permission or authority. This type of crime includes instances where a person
physically accesses someone else's computer, gains access electronically, or uses a virus to
gain access. These laws are often used in computer hacking cases where someone gains
access to someone else's computer without permission.
Access for fraudulent purposes

 Other states have laws that punish using a computer to accomplish a fraudulent act. Some
states, for example, make it a crime to use a computer, computer software, or computer
network to fraudulently obtain goods or services of any kind.

Data theft

 Even if you're allowed to use or access a computer, you can still commit a computer crime if
you access, copy, damage, or alter information you don't have permission to use. Some
states provide additional penalties in cases where the data theft resulted in damage, while
less severe penalties apply for thefts which did result in data being damaged, altered, or
destroyed.

Child pornography

 It's a crime to make, possess, or transmit images that portray child pornography. All 50
states, as well as the federal government, have laws which prohibit keeping pornographic
images of children. There are also laws which prohibit transmitting harmful materials to
children. Harmful materials include sexual or pornographic images that may be legal for
adults to view, but which are harmful to, or inappropriate for, children.

Luring or soliciting children

 Nearly all states have laws that make it a crime to use the internet to solicit, lure, or entice
a child to engage in a sexual act. These laws apply when a person aged 18 or older uses the
internet to communicate with a child. The age limit of a child for the purposes of these laws
is usually 16. However, a person can violate these laws as long as they believe the person
they're talking to is 16 or younger, even if the person is actually an adult.

Harassment, stalking, and bullying

 Various states have enacted laws which criminalize using the internet to stalk, harass, or
make criminal threats against someone. State stalking laws typically require that the threats
made must be credible, but a state's harassment laws may also punish internet
communications intended to threaten or harass even if the threat is not credible. Recently,
some states have enacted cyber bullying laws which criminalizes harassment aimed
specifically towards minors manage your social media settings. Keep your personal and
private information locked down. Social engineering cybercriminals can often get your
personal information with just a few data points, so the less you share publicly, the better.
For instance, if you post your pet’s name or reveal your mother’s maiden name, you might
expose the answers to two common security questions.

Other laws and new laws

 There are any number of federal and state crimes that may also apply in computer and
internet criminal cases. Federal wire fraud, for example, can apply to any case where a
person uses a computer or electronic communications device to fraudulently deprive
someone else of property. As computers and the internet continue to change and
proliferate, legislatures regularly introduce new criminal laws which apply to internet and
computer use.

You might also like