Preview

No Electronic Theft Act Of 1997 Essay

Better Essays
Open Document
Open Document
1030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
No Electronic Theft Act Of 1997 Essay
Week 4
Assignment 2: Computer Laws
No Electronic Theft Act of 1997

Assignment 2: Computer Laws
No Electronic Theft Act of 1997

Today, there are many laws that address different acts of computer crimes. It is very important to understand what laws are applicable in a given situation. The law I have selected is the “no electronic theft act of 1997.” The no electronic theft act is also known as the net act, it came into law under presidents Clinton in 1997. This was used to protect against copyright violations on the Internet. The law makes it a federal crime to reproduce, distribute, or share copies of electronic copyrighted work. As such it is a crime to distribute copyrighted material even if it is done without financial gain. The law also requires that the commission of the crime be willful and that the total value of the copyrighted material exceeds $1000. There also is a five-year statute of limitations, meaning that the crime must be charged and prosecuted within five years of his commission. The net act also makes it a federal crime to record live performances without permission and further distribute the recordings.
The no electronic theft act of 1997 impacts society in the United States and the global environment in several ways. First and foremost the law is not clearly understood by many people. Its provisions are
…show more content…
The results of these cases did not come close to meeting the penalties outlined in the law. The law calls for imprisonment up to three years for infringements with a total retail value of $2500 or more. Second offenses call for sentences not to exceed six years. For violations with a retail value less than $2500 and more than $1000 calls for imprisonment not to exceed one year or find in the amounts set forth. Through my research I was unable to locate any cases which actually resulted in

You May Also Find These Documents Helpful

  • Good Essays

    After a close examination of the journal article “The Unconstitutionality of the Computer Fraud and Abuse Act”, Michael C. Mikulic addressed the following points:…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The two Acts discussed in this paper are the Video Privacy Protection Act (1988), and the Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, (2003). These two acts were both enacted because along with the development of technology new issues arose in which no legal precedence had yet been established. These Acts were also both created nearly immediately after it was realized that there was a need for them.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act?…

    • 604 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are numerous amounts on Acts out there that protect web users; the Children’s Internet Protection Act, also known as CIPA and The Children’s Online Privacy Protection Act also known as COPPA are two Acts that protect what children’s see in the internet or their personal information on the web.…

    • 559 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This paper will explore two information technology acts; along with what ethical issues and information technology advances that caused the acts to be in place. The two acts that will be covered will be the electronic funds transfer act of 1978, and the children’s internet protection act of 2000. According to Rainer and Cegielski (2011) “Ethics refers to the principles of right and wrong that individuals use to make choices to guide their behaviors. Deciding what is right or wrong is not always easy or clear-cut. For this reason, many companies and professional organizations develop their own codes of ethics. A code of ethics is a collection of principles that is intended to guide decision making by members of the organization”.(Chapter 3, Ethics, Privacy, and information security).…

    • 640 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    sociology

    • 877 Words
    • 4 Pages

    Penalty: If the value of merchandise is under £150 there is up to 90 days jail. If more it can be up to 7 years.…

    • 877 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The internet has made is easy for people to access an unlimited amount of information at anytime. Advances in information technology have resulted in new ethical issues that needed to be addressed. Children need to be protected from being taken advantage of in this new digital age. Parents also want to ensure that their children aren’t subjected to material that is considered inappropriate. The federal government has passed laws to prevent the abuse of children on the internet.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The No Electronic Theft (NET) Act was enacted by Congress in 1997 to help prosecute of copyright violations on the internet. It makes it a federal crime to copy, distribute, and share copies of electronic works that are copyrighted, such as movies, games, and music. Also applicable in means of making copyrighted material available over networks. Before this Act was passed people who purposely distributed copied software over the internet did not face criminal penalties if they didn’t make profit off of it. Violation of the electronic copyrighting will carry out a maximum penalty of three years in prison and a fine of $250,000 ("University Information Technology Services",…

    • 277 Words
    • 2 Pages
    Good Essays
  • Good Essays

    For many years the Congress or Federal Government had to step into help and protect consumers by creating lawful Acts. Some of these acts are: the Family Educational Rights and Privacy Act (1974), Fair Credit Reporting Act (1970), Computer Fraud and Abuse Act, (1986), The Telephone Consumer Protection Act (1991), and Do not Call Implementation Act (2003). Presently the Federal Government has numerous acts that authorize the government to implement consumer protection; however, this paper will address only two of them. We will discuss the Telephone Consumer Protection Act (TCPA) of 1991 and the Do not Call Implementation Act of 2003.…

    • 661 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Property Crimes

    • 623 Words
    • 3 Pages

    The laws in regards to the property crimes deal with all intellectual and tangible as well as the property crimes committed in cyberspace and on telecommunications devices. In section §7-104, §7-105, §7-302.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays