Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary ICT (BALB4015)

Beoordeling
-
Verkocht
-
Pagina's
12
Geüpload op
04-02-2022
Geschreven in
2021/2022

LERANING ICT IN A BROAD SENSE

Instelling
Vak

Voorbeeld van de inhoud

Information Communication Technology – Compilation of Notes
Information technology (IT) is the use of any computers, storage, networking and other
physical devices, infrastructure and processes to create, process, store, secure and exchange all
forms of electronic data.
Cyber Space
Cyberspace refers to the virtual computer world, and more specifically, an electronic medium
that is used to facilitate online communication. Cyberspace typically involves a large computer
network made up of many worldwide computer subnetworks that employ TCP/IP protocol to
aid in communication and data exchange activities.



VARIOUS COMPONENTS OF CYBER LAW

Safeguarding data and privacy– Both private and professional information and data must be
secured thoroughly. Personal and financial information always attracts cybercriminals. Misuse
of this information by any other person is illegal and that is where these laws come into play.
The basic steps to safeguard your data and privacy is elaborated below
 Two-factor authentication for financial platforms and any other forums that provide this
function.
 Initiate Virus protection software.
 Use only verified payment methods on reputed websites.
 Avoid giving out personal information
Cybercrimes- These crimes are any illegal activities that occur on a networked technological
device. These crimes include online and network attacks, extortion, harassment, money
laundering, hacking, and many more.
Intellectual property- Intellectual property is basically an individual or group’s work,
designs, symbols, inventions, or anything owned by them which are intangible and are usually
patented or copyrighted. Now cyber theft would mean the stealing or illegal use of the same
intangible items.
Electronic and digital signatures- Nowadays most individuals and companies use electronic
signatures to verify electronic records. This has become reliable and regular. The wrong usage
by another of this signature is illegal and hence a cybercrime.

Some Early cyber legislations
USA
Computer Fraud and Abuse Act of 1984 (CFAA).
Cyberspace Electronic Security Act of 1999

, Cyber Security Enhancement Act (CSEA) was passed in 2002
Cybersecurity Act of 2010, a bill seeking to increase collaboration between the public and the
private sector on cybersecurity issues
UK
Computer Misuse Act 1990

Computer misuse offences under this Act

1. 1. Unauthorised access to computer material. – Section 1
2. 2. Unauthorised access with intent to commit or facilitate commission of further
offences. – Section 2
3. 3. Unauthorised acts with intent to impair, or with recklessness as to impairing,
operation of computer, etc. – Section 3
4. 3ZA.Unauthorised acts causing, or creating risk of, serious damage
5. 3A.Making, supplying or obtaining articles for use in offence under section 1, 3 or 3ZA


International Legal Development on E-Commerce
United Nations Commission on International Trade Law (UNCITRAL) was formed with a
mandate to further the progressive harmonization and unification of the law of international
trade and in that respect to bear in mind the interests of all peoples, in particular those of
developing countries, in the extensive development of international trade.
E- Commerce Electronic commerce, commonly written as E-Commerce or eCommerce, is the
trading or facilitation of trading in products or services using computer networks, such as the
Internet or online social networks. Electronic commerce draws on technologies such as mobile
commerce, electronic funds transfer, supply chain management, Internet marketing, online
transaction processing, electronic data interchange (EDI), inventory management systems, and
automated data collection systems. Modern electronic commerce typically uses the World
Wide Web for at least one part of the transaction's life cycle although it may also use other
technologies such as e-mail.
Increasing number of transactions in international trade are now carried out by means of
electronic data interchange and other means of communication, commonly referred to as
“electronic commerce”, which involve the use of alternatives to paper-based methods of
communication and storage of information.
Establishment of a model law facilitating the use of electronic commerce that is acceptable to
States with different legal, social and economic systems, was considered important to
contribute significantly to the development of harmonious international economic relations,
Thus, Model Law on Electronic Commerce was adopted on 30th January, 1997 by the
Commission at its twenty-ninth session after consideration of the observations of Governments
and interested organizations,

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
4 februari 2022
Aantal pagina's
12
Geschreven in
2021/2022
Type
SAMENVATTING

Onderwerpen

$7.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
ruthkuchata

Maak kennis met de verkoper

Seller avatar
ruthkuchata galgotias university
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
4 jaar
Aantal volgers
0
Documenten
1
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen