Tuesday, October 8, 2019

Cybercrime Essay Example | Topics and Well Written Essays - 4500 words

Cybercrime - Essay Example Data breaches can be combatted by propertizing data or by individual businesses informing consumers about their rights regarding the use of their data. Illegal downloads can be combatted by actions by the music artists themselves, as well as remedies that involve shutting down the sites that sponsor the downloads. Child pornography, in and of itself, is best combatted with legal means, such as criminal prosecution. However, the two types of pornography that are examined in this paper – extreme pornography between adults and child pornography that involves , characters - should be dealt with other means. The data breach section examines United States law, as does the section regarding illegal downloads. The pornography section involves UK law. Hence, the topics are examined with a multinational perspective, which is the best way to examine these topics, as these topics are global in nature. Cybercrime – Data Breaches One major example of cybercrime is the data breach, wh ich results in â€Å"the distribution of personal information 'beyond the bounds of...consent and expectations.'†1 These breaches may be the result of an unauthorized person accessing a company's database, or might be the result of an employee losing his or her laptop or other portable storage device. These are only some of the ways that breaches might result, and there are many more. 50% of the data breaches are committed by employees of the company that is breached.2 Breaches can lead to identity theft and fraud, such as when TJX Companies, Inc., the operator of TJ Maxx and Marshall stores in the United States, announced in January 2007 that it was the victim of a security breach, which exposed 94 million credit card records to outsiders, and these outsiders made fraudulent credit card purchases with this information about TJX customers.3 Since the cardholders had to pay for the fraudulent charges, not the individual customers, the banks who issued these cards filed suit ag ainst TJX an won a $41 million verdict ordering TJX to pay reimburse them for their losses.4 Moreover, since up to 400,000 of the TJX records included their customer's social security numbers and driver's license numbers, the thieves were able to steal identities as well.5 Stealing social security numbers is an infinitely more serious problem than accessing the individual's credit cards, as identity thieves are able to use the social security number to open up new accounts for which the individual is responsible, and gives the thief â€Å"virtual keys† to the victim's financial life,6 enabling the thief to â€Å"empty bank accounts, obtain credit cards, secure loans, open lines of credit, connect telephone services, and enroll in government benefits in the victim's name,†7 while merely stealing credit card information only leaves the individual with the inconvenience of having to close that particular account. Moreover, â€Å"[i]dentity thieves also commit crimes in t he victims names. A victim of criminal impersonation risks arrest and a criminal record for an identity thief's transgression†8 Breaches resulting in thefts of social security numbers are very expensive and time-consuming for the victims, as they spend an average of $1,000 in out of pocket expenses and 600 hours in personal time cleaning up the mess, and lose on average $16,791.9 The risks of social security numbers and other personal information falling into the wrong hands can also be deadly, as in the case

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.