Blog | Cyber legislation Defending Democracy

Cyber legislation Defending Democracy

1

Author : Thomas | Dec 12, 2020

                                                     Cyber Legislation Defending Democracy

                                                      Security theme with a man on blurred city background


Our Cybersecurity Law is necessary to establish a confidentiality knowing we can protect individual and private information thus protecting our economic and National Security.

Let us look at the Cybersecurity Act of 2015: This act was signed into law by President Obama on December 18, 2015. This act is significant in that it laid the foundation for cybersecurity information being shared among private and federal entities. It is cyber law itself that deals with the legal system that deals with the internet, cyberspace, and legal issues.

There are many subtopics covered by cyber law: freedom of expression, access to and use of the internet, as well as online privacy. Cyber law consists of many different types of law protecting us from

  • Fraud,                                              
  • Copywrite violations,
  • Defamation,
  • Harassment,Back View in the System Control Center Operator Working. Multiple Screens Showing Technical Data.
  • freedom of Speecom,
  • Trade secrets,
  • employment law.

Cyber laws supervise the digital circulation of information, software e-commerce and monetary transactions. The information Technology Act 2000 relates to new-age crimes: computer technology, mobile dives, Software and the internet.

Cyber security thus protects the data and integrity of assets belonging to an organizations network.

There are six primary areas of concern for cypher law: e-commerce, online contracts, business software patenting, e-taxation, e-governance and cypher crimes.

Cyber laws protect consumers from online frauds: including credit card theft, identity theft and other online deceptive crimes. It gives legal recognition to electronic documents and a structure to support e-filing and ecommerce transaction reducing cybercrimes. It is important because it covers all transactions over the internet.

Thus, it is focused on acceptable behavior use of technology including computer hardware and software the internet and networks. In effect it helps protect from harm by enabling the investigation and prosecution of online criminal activity.

A cyber attack is an assault by cybercriminals using one or more using one or more computers against a single or multiple computers or network. A cyper attack can disable computers, steal data, or use a breached computer as a launch point for other attacks. One of the biggest cyber attacks was under stolen credit card and financial data

  • 2017 Equifax data breach
  • 2016 Indian
  • banks data breach: estimated 3.2 million debit cards were compromised.
  • 2014 JPMorgan Chase data breach: allegedly conducted by a group of Russian hackers.

The Federal government regulates Cybersecurity. There are three main cybersecurity regulations:

  • 1996 Health Insurance portability and Accountability Act (HIPAA)
  • 1999 Gramm-Leach- Bliley Act
  • 2002 Homeland Security Act, which includes the Federal Information Security Management Act.

Cyber Security Icon Concept

The objectives of cyber law is to develop trends in Cyberlaw impacting cyberspace in the current situation. To generate a better awareness to battle the latest kinds of cybercrimes impacting all investors in the digital and mobile world.

One of the best ways to improve cyber security is to create strong passwords and change them frequently and update information regularly.

We at Tommy’s Team work actively to make the community as well as the society around us to be a better place to live in, and we also encourage many people to send us their ideas and suggestions so that we can improve society at large, for everyone concerned. And yes, this also includes


Recent Messages :


Share With :