Q : 1 : According to the Federal Criminal Code link to Computer Intrusions , downstairs(a) chapter 121--stored telegraph and electronic communications and trans wreakional records admission worth code , it is forbidden to intrude to both computer as mentioned in the rule (2 ) Intentionally exceeds an authorization to approach that facilitySteve is doing cardinal crimes , he has hacked the system , and he is also disclosing the knowledge for moneymaking(prenominal) adjudicate . Under the cyber crimes rules , sub-section 2701 (a ) with regards to hacking , the punishment isA ) A fine under this gentle or imprisonment for non more than 5 years , or both , in the case of a primeval offense under this subparagraph and (B ) A fine under this demand or imprisonment for not more than 10 long time or both , for either subsequent offense under this subparagraphWhile the under the 18 U .S .C . 2510 .Wire and Electronic Communications Interception and Interception of free Communications clause as mentioned below , anyone disclosing the sensitive credit line tuition as mentioned below (c ) Intentionally splits , or endeavors to publish , to any other person the contents of any telegram , oral , or electronic communication knowing or having reason to know that the information was obtained by means of with(predicate) the interception of a fit , oral , or electronic communication in invasion of this subsectionunder 2520 , Recovery of civil remedy has to constitute statutory regaining of not less than 100 and not more than reason .
The court will also asses , how long Steve was breaking the righteousness and under that rules , he may be liable to give in (A ) The sum of the makeual damages suffered by the plaintiff and any profits made by the violator as a result of the invasion or (B ) Statutory damages of whichever is the greater of 100 a day for each day of impingement or 10 ,000 Q : 2 Electronic commerce is be as transaction : conducted over the mesh or with meshing access , comprising the sale , lease license , wind , or delivery of attribute , goods , services , or information , whether or not for consideration , and includes the provision of Internet access Anyone starting an electronic telephone circuit has to abide by the rules and linguistic rule , such as the Electronic communication Privacy act (discussed earlier ) forbids , the un-authorized use of information to outsiders by any shopping mall , be it ora l or phone or through emailDomain name is considered a piece of intangible personal seat and is not subject to conversion . Under the Cyber Squatting and Internet related infringements , it is not allowed to confuse the consumer either by synonymous name or confusing name or flurry or selling fake products . The person who buys over the ineternet from rile .com considers it authentic exploit brand , which may not be if BUG sells it over to some other company for lieu . If BUG sells the domain , consumer will still believe they atomic number 18 logging into Bug , and buying from BUG , which will not be true . Bug business is related to a special product , which consumer trust and may shop online from the stilted Bug , which will be cheating...If you wishing to get a full essay, order it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment