Computer "Law"

Topics: Intellectual property, Property, Property law Pages: 5 (1833 words) Published: September 3, 2013
RUNNING HEAD: Computer law

Computer “Law”
Edward A Celaya
September 5, 2012
Regis University

Abstract
In the world of Information Technology the one thing that is king above all others should be the security of the device or network a person is on because if they feel that they can’t trust the network or device it is more than likely not going to be used. And even with cultural and corporate interests abound it is clear that intellectual property needs to be protected in order to insure a safe and secure computer experience.

Introduction
In the world of Information Technology the one thing that is king above all others should be the security of the device or network a person is on because if they feel that they can’t trust the network or device it is more than likely not going to be used. We live in a world that is consistently changing and so are the criminals, so therefore the justice system must change along with it to make sure it can counter anything that does arise. Also in this world beyond just the laws that are put into place there can be ethical boundaries that are also put into place that aren’t actually law but shouldn’t have to be because it should just be common knowledge. Laws

Historically, the United States has been a leader in the development and implementation of information security legislation to prevent misuse and exploitation of information and information technology (PIS 1). This right here already goes to show that laws are based in the culture of the country someone is in and why laws can’t always cross borders like ethics can. But in the U.S. there are numerous amounts of laws that have been put into place in order to make sure that any person in America is safe and secure knowing that there are certain steps that have been put into place to protect them. The most important one that most remember and is affected by is HIPAA, this is a law that protections a person medical information from being shared with anyone what so ever no excuses unless the patient is aware and has given consent. And with the American Recovery and Reinvestment Act of2009 (ARRA) the HIPAA Act has been given even more teeth because it now also broadens the scope of HIPAA and gives HIPAA investigators direct, monetary incentives to pursue violators. And with the ARRA it also broadens the scope of HIPAA to cover all business associates of Health Care Organizations (HCOs) (PIS 2). Now the laws on computers aren’t limited to just the states there has been a push on the international scene to get with the program and make some computer issues borderless. So the Council of Europe adopted the Convention on Cybercrime in 2001. It created an international task force to oversee a range of security functions associated with Internet activities for standardized technology laws across international borders. It also attempts to improve the effectiveness of international investigations into breaches of technology law (PIS 3). But in all honesty even with the attempts on the global scale the Convention on Cybercrime lacks any realistic provisions for enforcement. The overall goal of the convention is to simplify the acquisition of information for law enforcement agencies in certain types of international crimes (PIS 4). So mainly the global arena has made it easier to co-operate but not crack down. Ethics

So that brings us into the world of Ethics, because ethics are even more cultural based the borders that are torn down are usually with people that already have the same laws in place. When it comes to ethics the best list that covers most peoples desires are: 1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s computer files. 4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Cyber Law Essay
  • Antitrust Law Essay
  • Business Law Case Study: Corporate Compliance Plan Essay
  • Essay about Computer Ethics, Privacy
  • Computer Software Piracy and It's Impact on the International Economy Essay
  • Essay about law Exam
  • business law and ethics project Essay
  • Mass Media Law and the Problem of Copyright Essay

Become a StudyMode Member

Sign Up - It's Free