Preview

Exploring the Nuances of Cyber Law

Good Essays
Open Document
Open Document
2158 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Exploring the Nuances of Cyber Law
EXPLORING THE NUANCES OF CYBER LAW

I– Why and what of cyber law?

Cyber law, or the law dealing with cyber-space, popularly called ‘internet’ or ‘net’, is the buzz word today in law school curriculums and across the generation of old lawyers across the world. Why? Because this is more to do with technology rather than law alone. Imagine a law providing definition of ‘meta tag’, something which any computing geek can tell you. Then the law defining an ISP. Sounds hilarious and then absurd. Why should the law attempt to define these terms when they are well known and understood in the same manner across the globe? Why purpose would be served even if the law were to define the same? The slow and steady moving law can never compete with the level of technology existing at any point of time and the speed with which it grows. So what is the point of making a law, which by the time is come to govern, it is already outdated. These and other oddities of cyber law make it an interesting subject indeed.

Well, it seems there is a purpose. The purpose is ‘regulation’, something which the law exists for. The purpose is to identify the course of events, as they take place on the cyber space, and then provide a mechanism to determine rules affixing responsibilities and liabilities on the participating actors in the transactions. Take for example a simple and every day case of a cyber-café. A goes in Xena Computings and used the café for an hour. In this time, he views Z government’s site and tries to interfere with the site-coding. He is unable to change the things and so he leaves. Now should the government whose site has been fiddled with do something? Let us say that Xena Computings is situated in Z country only but A is of Y country. Can anything be done?

Well here comes the role of cyber law. It firstly defines unacceptable code of conduct on the cyber-space (something like cyber offences) and then prescribes a mechanism or procedure to deal with the situations

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Copyright infringement are classified into three different theories. They are direct, indirect and vicarious. Direct is the most obvious form because of the copyright owner can prove legal ownership of the work in question and the infringed copied the work without permission. A facilitator of indirect theory of copyright infringement is liable for damages. The copyright owner must identify the direct infringer, and the facilitator must have knowledge of the infringement. Companies that do not follow the copyright laws when they are using the internet leaves the company open for charges or a cybercrime.…

    • 343 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There are many cases of cyber crime committed daily, but one specific case of cyber bullying has brought to question if the laws of today are effectively in place for cyber citizens. However, due to the suicide in the Meier verses Drew case, it did lead the authorities to take certain precautions and counter measures. Though the Meier suicide was unfortunate, the case shed light upon the issue and, as Keen put it, made “officials get more serious about holding anonymous internet users accountable.”…

    • 428 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyberlaw Outline

    • 3821 Words
    • 16 Pages

    - Use of Brookfield’s MovieBuff trademark by West Coast as a domain name was infringement.…

    • 3821 Words
    • 16 Pages
    Good Essays
  • Good Essays

    References: * Hart, J. D. (2007). Internet law: A field guide (p. 750). Washington, D.C.: BNA Books.…

    • 952 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Study Guide for Business Law

    • 2585 Words
    • 11 Pages

    Policy makers, users, and posters are all concerned about the degree to which we need to impose the force of law on Internet activities.…

    • 2585 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Technology is expanding everyday. Our society has grown and expanded and has become extremely powerful because of new technologies. People are learning how to use computers in place of their tasks. The Internet is a prime example is of expanding technology. One can obtain yesterday’s and today’s news, listen to music, talk to a friend over seas, view pornography, and countless other things in the privacy of one’s home via the Internet. There is no way to really regulate what is on the Internet. Essentially, the government has no place on the Internet.…

    • 1567 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Good Internet Censorship

    • 2008 Words
    • 9 Pages

    Cheung, A., 2006. The business of governance: China 's legislationoncontent regulation in cyberspace. International Law and Plitics, Volume 38, pp. 1-38.…

    • 2008 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    A lot of people are very adament about self-regulation. Any other kind of government regulation on the internet would be a very long process. It's not just the U.S. that has access to this tool. It is the World Wide Web, meanig it's world wide. There would need to…

    • 480 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Controversy Over Internet

    • 560 Words
    • 3 Pages

    Controversy over Internet Police has raged on since the creation of the internet. Several have thought that not policing the internet has led to numerous crimes such as theft, illegal transactions, and cyber bullying. But a majority, in defence, claim that such policing could revoke us from our rights as citizens of the United States. Cases as such tend to lean more to the side of not policing the Internet. We believe that as well.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ©Lessig 1998: This essay was presented at the Taiwan Net ’98 conference, in Taipei, March, 1998.…

    • 6041 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Some people might say that this will be an invasion of their privacy; I say why would you put private things on the internet?…

    • 502 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ARPANET, predecessor of the internet, was developed by United States of America to prove their robustness in the realm of technology and as answer to USSR’s launch of sputnik. This marks the beginning of the era of internet. Internet’s ubiquitous nature has pervaded the lives of each and every person in this world. It has provided intellectual property owners with a seemingly unlimited market for their creations. Simultaneously, however, it has also offered ample opportunities to users seeking to infringe the rights of others. Since internet is an infinite space the place of commission of the crime is extremely difficult to determine and also to make the person committing the crime liable for it. Therefore, it is of utmost importance to surmount this obstacle by creating an impervious system of protection of intellectual property on the Internet. The focus of this paper is particularly on the abuse of domain names and ‘Uniform Domain Names Dispute Resolution Policy’ which helps in securing the rights of the victims of ‘cybersquatting’. It will also discuss the Indian scenario right from the landmark Yahoo! case till the more recent cases. This paper also seeks to explain the Indian Domain Name System and provide recommendations to make the Internet a safer haven for the Intellectual Property owners.…

    • 2819 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Internet of Things

    • 3763 Words
    • 16 Pages

    a b s t r a c t The Internet of Things as an emerging global, Internet-based information service architecture facilitating the exchange of goods in global supply chain networks is developing on the technical basis of the present Domain Name System; drivers are private actors. Learning from the experiences with the ‘‘traditional’’ Internet governance it is important to tackle the relevant issues of a regulatory framework from the beginning; in particular, the implementation of an independently managed decentralized multiple-root system and the establishment of basic governance principles (such as transparency and accountability, legitimacy of institutional bodies, inclusion of civil society) are to be envisaged. ª 2009 Prof. Rolf H. Weber. Published by…

    • 3763 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Cybercrime Law

    • 265 Words
    • 2 Pages

    We don’t really need more laws specifically for the internet. We have enough laws that can already be applied to the virtual world. Stealing, for instance whether offline or online can be treated the same way. But we know it is not as simple as that. How people behave online is not always the same as how they behave offline. Online anonymity, for one, can make people braver to participate in discussions. At the same time, it can make them more cruel. Online bullying and cybersex is definitely not good. The passage of the Cybercrime Prevention Act was really meant to protect our society from hacking, identity theft, cybersex, and pornography, among others. Being safe and behaving properly in the internet is something we should not leave for the government to perform. This is something we can all do together. We should properly express our views and feelings towards this law so that this law may be gone. By obtaining back their trust from us, this would be possible. We should not bark like dogs and act cruel in the internet. We should behave properly and follow rules that have a great role. We should be more careful in sharing information and opening restricted sites that concern public safety as well as our safety. The internet is not yet finished. We should be careful with the rules and the things that we do, so that we will no longer suffer for this law and in order for the next generation to use it freely. And by following these things, this problem will be…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crimes

    • 689 Words
    • 3 Pages

    To start, there are several instances where a person is violated on the Internet. The primary example of being violated in cyber space is defamation. Defamation is essentially any type of slander against someone on the Internet. Whether it is through a blog post, video post, chat room, or message board, attempting to harm someone’s reputation is against the law. The person committing the crime of defamation can be sued for libel. It is wrong to try and ruin someone’s reputation and businesses need to realize that even if they are just joking around, saying derogatory things about someone is against the law. However, the Internet Service Provider cannot be held accountable for someone committing defamation. The Internet is a place of freedom but abusing that freedom cannot be the fault of the service provider. The Federal Communications Decency Act was created to protect these ISP’s and remind users to be decent on the Internet. Several laws have been created due to people abusing the Internet and the service providers are not to be blamed.…

    • 689 Words
    • 3 Pages
    Good Essays

Related Topics