State Laws Regarding Computer Use and Abuse Report

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

In the United States, different states have passed various laws with regards to computer crime. This has been necessitated by the numerous acts of hacking into public and private computer systems by individuals or groups, something that has brutalized computer use all over the world.

We will write a custom essay on your topic a custom Report on State Laws Regarding Computer Use and Abuse
808 writers online

The computerization of almost every aspect of modern society means that information, sensitive or otherwise is stored in computers and thus the risk factor rears its ugly head that other unauthorized users can access that same information. The safe guards meant to keep such information safe have more often than not been rendered ineffective by highly skilled hackers.

Any device vital to national security that is controlled using computers could be used against the U.S if it ever fell into the wrong hands. It was therefore deemed necessary to pass laws regulating the use of computers in a bid to promote safety when using them (New York State Law, 2009). This study is about the laws of the state with regard to the use of computers and the abuse thereof. Computer crime is divided into three categories according to Flexispy (2010);

  1. Illegally obtaining computer materials such as hardware, software, and peripherals.
  2. Crimes targeting computer networks and or devices. Hacking and the generation of viruses, worms etc fall under this category.
  3. Committing crimes by using computers and computer networks. Piracy of music, movies, software, and cyber terrorism falls under this category.

Discussion

The New York state law according to the Legal Directories (2011) has criminalized the unauthorized use of a computer, computer trespass, tampering with a computer; this has four degrees, pirating of computer materials, “class e felony”, unlawful possession of computer materials and Unlawful entry into a computer “class e felony”, unauthorized use of a computer, ”class a misdemeanor”. Tampering with data,” class d felony” (U.S. Department of Homeland Security, 2010).

  1. If anyone violates these laws his/her defense can be that he /she had logical grounds and or rights to tamper with, reproduce, destroy and or use the computer and or material in contention but if found guilty, is subject to punishment as provided for by the law( New York State Law, 2010).
  2. The Alabama computer crimes act criminalizes the unauthorized access of data, software, or any material within a computer, its manipulation, destruction, examination, and possession (Iron Geek, 2011). The violation of such would constitute a violation of intellectual property rights. If the damage caused to the said intellectual property exceeds ($2500), and or it results in the disruption of any public utility or service, the offender is guilty of a class b felony. Unauthorized removal and alteration of data causing physical harm to a person not involved in the crime is categorized as a class a felony (Cornell University Law School, 2012).
  3. The modification willful or otherwise of any equipment that is used or intended for use in a computer is guilty of an offence against computer equipment and supplies. This crime is classified as a class a crime. Samson (2012). Alabama computer crime Act.

Conclusion

The laws against computer related crimes are broad in both states but adequately address the problem of cyber crime and other computer crimes. Most of the laws are similar in classification of crimes and in their definition of abuses, but differ in terms of penalties.

References

Cornell University Law School. (2012). . Web.

Flexispy. (2010). The world’s most powerful spyphone. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Iron Geek. (2011). . Web.

Legal Directories. (2011). . Web.

New York State Law. (2009). . Web.

New York State Law. (2010). Article 156 – Penal Law. Web.

Samson, M. (2012). Alabama computer crime Act, Internet Library of Law and court Decisions. Web.

U.S. Department of Homeland Security. (2010). United States computer emergency readiness team. Cyber threats to mobile devices. Web.

Print
Need an custom research paper on State Laws Regarding Computer Use and Abuse written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2022, August 22). State Laws Regarding Computer Use and Abuse. https://ivypanda.com/essays/a-report-on-state-laws-regarding-computer-use-and-abuse/

Work Cited

"State Laws Regarding Computer Use and Abuse." IvyPanda, 22 Aug. 2022, ivypanda.com/essays/a-report-on-state-laws-regarding-computer-use-and-abuse/.

References

IvyPanda. (2022) 'State Laws Regarding Computer Use and Abuse'. 22 August.

References

IvyPanda. 2022. "State Laws Regarding Computer Use and Abuse." August 22, 2022. https://ivypanda.com/essays/a-report-on-state-laws-regarding-computer-use-and-abuse/.

1. IvyPanda. "State Laws Regarding Computer Use and Abuse." August 22, 2022. https://ivypanda.com/essays/a-report-on-state-laws-regarding-computer-use-and-abuse/.


Bibliography


IvyPanda. "State Laws Regarding Computer Use and Abuse." August 22, 2022. https://ivypanda.com/essays/a-report-on-state-laws-regarding-computer-use-and-abuse/.

Powered by CiteTotal, essay citation maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1