Hello my dear readers. I have been with you around 4 months with some interesting cyberlaw news .Now I wanna inform you that I have some exams in the following week . So I can't be with you in that moments .Then I 'll be back :)) .


Hello there, This is one of the latest news about cyberlaw . With the coming of 3G, the next wave of cyber attacks will be on the mobile phone, said cyber security expert Vijay Mukhi, at a seminar on the penultimate day of the Cyber Safety Week 2010 organised by the Mumbai Police.

He was addressing an audience comprising travel industry members on the issue of E-commerce security at the Police Gymkhana, Marine Drive.

“Mobile phones will be the next computer and with the coming of 3G on handsets that will ensure faster Internet speeds on the go, the number of frauds too will go up,” he said.


Some bad news for Google now, as it has been reported that a group of 10 countries have joined forces in their criticism of Google services such as Street View and Google Buzz.

The countries mentioned include Canada, France, Germany, Ireland, Israel, Italy, the Netherlands, New Zealand, Spain and the United Kingdom.

They are unhappy over the current amount of protection that these services offer consumers, and recently signed a letter, which Google has already acknowledged and called ‘ironic’.

There has always been a debate over Street View and whether it offers members of the public enough protection when Google capture images. As for Google Buzz, users are unhappy with certain aspects of the service which originally revealed personal details about users – although Google soon fixed this up.

To put it in simple term, defamation occurs when a person expresses words that may lower another person’s reputation in the eyes of the public.

There are two types of defamation in Malaysia: libel and slander.

Libel is when such words are expressed in a permanent form which is usually visible to the eye, like in a book, e-mail or picture.

Slander is when such words are expressed in a temporary form, usually when spoken or made by body movements.

Can a Blog Be Sued for Defamation; Isn't It All Free Speech?
This is a knotty issue, but a short answer would be, generally, that a blog owner whose blog has published obnoxious materials can be held harmless while a blogger using the site can be liable. The Communications Decency Act of 1996 is a protector of blog owners. It states, in section 230, that it "precludes courts from entertaining claims that would place a computer service provider in a publisher's role." As to how the court sees blogs, in general, overall, the US Supreme Court has ruled that blogs are similar to news groups, saying "in the context of defamation law, the rights of the institutional media are no greater and no less than those enjoyed by other individuals and organizations engaged in the same activities."

For bloggers, all Defamation legal rules apply to their posts. But there are many complications in applying them. First, many people who post online comments, and probably those tending to make the most inflammatory and false statements, will do so anonymously, for obvious reasons. So the first threshold is identifying the blogger making Defamatory claims. Several things make this difficult, as well. Since the blogger probably will not identify themselves when the issue comes to light, there needs to be a legal process that allows identification. They can be traced by high-tech means, but a court must agree via summary judgment that all the elements of Defamation have been met. This technology does have some limits, as well, as it can be stymied through use of "Proxies," which mask the true origin of the blogger. Also, the website owner may not cooperate in the search, as well.

A recent case showed how powerful Defamation laws, applied online, can be. In November 2006, a Florida woman, Sue Scheff, was awarded $11.3 million in damages in Broward County Circuit Court, in one of the biggest awards ever tolled. The suit was filed for Internet defamation, and the jury found a Louisiana woman had posted caustic messages against the Scheff and her company, claiming she was a "con artist" and "fraud". The jury found the charges were completely false, so the Louisiana woman had no defense. Interestingly, Scheff's attorney had offered to settle the case for $35,000 before it went before the jury.

Sunderland businessman John Finn has been declared bankrupt over unpaid court costs.
The housing boss and his company were left with legal bills running into hundreds of thousands of pounds after accepting they were responsible for publications on a controversial website.

Mr Finn and Pallion Housing agreed to pay a £119,000 settlement in what was believed to be at the time the UK's biggest Internet defamation payout, after the High Court hearing in April 2008.

They were told to hand over the six-figure sum to Peter Walls, boss of gentoo, formerly Sunderland Housing Group.

The payout came after anonymous statements were made on the Dad's Place website and in other publications, which over a two-year period made serious allegations about gentoo and its managers.

Pallion Housing went into administration on July 22, 2009.

But it is understood that £409,000 in costs are still outstanding, which were accruing interest at a rate of £805 a week.

Andrew Taylor, deputy chief executive of gentoo group, confirmed that gentoo had petitioned for bankruptcy against John Finn at Newcastle Law Courts on Wednesday.(Read more)

How do you feel about a United States President having the power to possibly shutdown portions of the Internet?
The US Senate committee has approved legislation which effectively gives President Obama the power to shut off parts of the internet when there is a national emergency.The legislation is called Protecting Cyberspace as a National Asset Act and will allow the President in times of national emergency to implement response plans for protecting the infrastructure of the web, as well as the electrical grid and telcom networks.



Hi I read a news and found this case about phishing in Malaysia.This case is about Maybank. Somebody send email to so many addresses has gotten onto some local Malaysian scam/spam e-mail list. The e-mail which supposedly sent the phishing mail was "Maybank (maybank@security.com.my)" with the mail looking as follows:



















and contain this text that was terrible grammar , so should give you a warning bell in your head that this probably isn't a legitimate e-mail.
"We are hereby notifying you that we've recently suffered a DDos-Attack on one of our's Online Banking server. For security reasons you must complete the next steps to verify the integrity of your Maybank account. If you fail to complete the verification in the next 24 hours your account will be suspended.

Here's how to get started:

1. Log in to Maybank online account (click here).

2. You must request for TAC via Maybank online banking - your TAC will be sent via SMS to the mobile phone number you registered. (you can find the "Request a TAC" button in the Utilities menu of your account)

3. Logout from your account and close the browser.

4. When you have received the TAC (Transaction Authorization Code) on your mobile phone, go to our secured verification server and submit the requested information (Username, password and TAC). (click here) to go on our secured server.

5. Please allow 48 hours for processing.

Please comply and thanks for understanding.

***This is an automated message, please do not reply***"


so many user from Maybank uploaded their information in this site and Hackers got use name and password of them .after that Maybank came whit the following message:

Please do not login in this website or comply, it is fake!!

Hi, in this post I want to write about phishing.What is phishing ? The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a special web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The web site however, is bogus and set up only to steal the user’s information.

Hello my friends ,today I understand that WordPress.com website got filtered in Iran. It means a large number of Farsi blogs hosted on WordPress are inaccessible in Iran. I don't understand what! but in this months so many blogs such as Blogspot.com (Blogger) was also filtered while ago but the blockage was lifted after a few days.

Hi my friends .I want to speak about cyber law in malaysia in this post.Cyber laws are the law used to control the behavior of computer users in the country. For your information, there are currently four cyber laws which have been approved by the government of Malaysia which is known as Digital Signature Act 1997, Computer Crimes Act 1997, Telemedicine Act 1997 and Communication and Multimedia Act 1998.

Digital Signature Act 1997

The Digital Signature Act 1997 are used to protect computer user who use electronic communications especially on the Internet.

Digital Signature is a technology to verify the identity of a person using encryption techniques to protect against e-mail forgery. The encrypted code consists of the user’s name and a hash of all the parts of the message.

Telemedicine Act 1997

In Telemedicine Act 1997 stated that only qualified medical practitioners can use telemedicine and that their patient's rights and interests are protected.

Communication and Multimedia Act 1998

By the implementation of Communication and Telecommunication Act 1998 ensures that information is secure, the network is safe, reliable and the service is affordable all over Malaysia.


Computer Crimes Act 1997

Protection against the misuses of computers and computer criminal activities are ensured by the Computer Crimes Act 1997. Such as unauthorized use of program mes, illegal transmission of data or messages over computers and hacking and cracking of computer OP and networks are banned by this law, therefore to those who disobey this law can be charged on the court.






Hi there , I watched this video yesterday and I uploaded in my blog because is about privacy in workplace and discus about two cases one of them is 4 employees busted for using company cellphone for personal texts !


Recent surveys have found that a majority of employers monitor their employees.

Employers want to be sure their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring.

New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications.

Close to half of employers track content, keystrokes, and time spent at the keyboard. And 12% monitor blogs to see what is being written about the company. Another 10% monitor social networking sites.

Almost half of the companies use video monitoring to counter theft, violence and sabotage. Of those, only 7% state they use video surveillance to track employees’ on-the-job performance. Most employers notify employees of anti-theft video surveillance (78%) and performance-related video monitoring (89%).

Telephone Monitoring
Can my employer listen to my phone calls at work?
yes. For example, employers may monitor calls with clients or customers for reasons of quality control. However, when the parties to the call are all in California, state law requires that they be informed that the conversation is recorded or monitored by either putting a beep tone on the line or playing a recorded message.

Computer Monitoring
If you have a computer terminal at your job, it may be your employer's window into your workspace. There are several types of computer monitoring.
  1. Employers can use computer software that enables them to see what is on the screen or stored in the employees' computer terminals and hard disks. Employers can monitor Internet usage such as web-surfing and electronic mail.

    People involved in intensive word-processing and data entry jobs may be subject to keystroke monitoring. Such systems tells the manager how many keystrokes per hour each employee is performing. It also may inform employees if they are above or below the standard number of keystrokes expected. Keystroke monitoring has been linked with health problems including stress disabilities and physical problems like carpal tunnel syndrome.
  2. Another computer monitoring technique allows employers to keep track of the amount of time an employee spends away from the computer or idle time at the terminal.
Electronic Mail and Voice Mail
Is electronic mail private? What about voice mail?
no. If an electronic mail (e-mail) system is used at a company, the employer owns it and is allowed to review its contents. Messages sent within the company as well as those that are sent from your terminal to another company or from another company to you can be subject to monitoring by your employer. This includes web-based email accounts such as Yahoo , Gmail and Hotmail as well as instant messages. The same holds true for voice mail systems. In general, employees should not assume that these activities are not being monitored and are private.


In an attempt to quell increasing privacy concerns among its users, Facebook this week launched a new page aimed at helping them better protect personal information posted on the social network.

The company announced the new Facebook privacy page in a blog post yesterday.

"The Facebook Privacy Page serves as a living resource and a venue to facilitate an interactive discussion about privacy with all of you," wrote Simon Axten, a manager on Facebook's public policy team, in the post. "We'll regularly post updates on relevant new content, products and news stories related to online privacy. Already you'll find a repository of online privacy resources both from Facebook and outside experts, including our video tutorials on how to choose your settings, as well as links to our privacy guide and FAQs."

Facebook has been hit with increasing criticism from privacy advocates over the past couple of years. The criticism heated up markeedly in April after Facebook unveiled a bevy of tools that would allow the sharing of user information with other Web sites.

That move caused an uprising among users and even prompted a handful of U.S. Senators to pen an open letter calling on Facebook to amend its privacy policies.

Facebook first responded last week with the release of a set of new, simpler privacy controls. That move appeared to appease many users who had complaine that the earlier controls were too complicated and confusing.

However, Facebook CEO Mark Zuckerberg stirred up the issue again earlier this week when he sidestepped questions about privacy at the Wall Street Journal's All Things Digital, or D8, conference.

Ezra Gottheil, an analyst with Technology Business Research, said the social networking firm has to work on reviving its image, and that a big part of the effort will have to be listening to the privacy concerns of Facebook users.

"A privacy page could be very helpful," Gottheil said. "I'd like to see how effectively Facebook directs users to that page, and I'd like them to be very public about any changes to their policy. That's really my biggest problem with Facebook. They haven't encourage people to think about those settings.

"The problem is that Facebook wants to pretend there's no potential downside to sharing everything," he added. "They are now showing they understand that some people care, but they are not showing that they understand why."


Kevin Mitnick was one of the most talented hackers, and the one one most prosecuted by the state. Mitnick's hacker handle was "Condor". He became the first hacker to appear on an FBI "Most Wanted" poster, for breaking into the Digital Equipment Company computer network. When he was captured he was sentenced to a year in a treatment center to get over his "computer addiction".

In February, 1995, Mitnick was arrested again for breaking into various computers and downloading 20,000 credit card numbers. In April, 1996, he pleaded guilty to illegal use of stolen cellular telephone numbers. But his most celebrated hacking exploits involved breaking into company computers and downloading proprietary software as a kind of trophy to prove that his hack was successful.

The story of Mitnick's capture is described in The Hacker Takedown, starting with the discovery by security expert Tsutomu Shimomura that his computer had been hacked, and ending by tracking the incursion to a specific modem in a NETCOM.com site in Raleigh, North Carolina. Finally, the FBI used cell-phone tracking equipment to find and capture Mitnick in his apartment.

Because Mitnick was seen to be so dangerous around any electronic network, he was held in jail without bail for four years without trial, before finally pleading guilty and accepting a five year sentence including time served, and was freed ten months later in January 2000. However, even then, the conditions of his release included no contact with a computer or a cell phone, making it difficult for him to make a living.

Mitnick has become something of a celebrity in hacker circles due to his unusually vigorous, some say unfair, prosecution by the state authorities. Several hacker groups have broken into various websites and posted messages in Mitnick's defence, most notably on the website of the New York Times.


New Facebook of Pakistan:Muslim Facebook Called Millat Facebook

he Pakistani Facebook controversy over the Draw A Mohammad Day page has taken a new twist with some Pakistani developers launching a new site to rival Facebook. The site called Millat Facebook (millatfacebook.com) and is created to cater to 1.57 billion Muslims around the world.

The about page of the site says this about Millatfacebook:

Millatfacebook is Pakistan’s very own, first social networking site. A site for Muslims by Muslims where sweet people of other religions are also welcome!!

The site goes on to tell how Facebook has not been listening to complaints and how it is making almost 50% of revenue from Muslim Facebook users.

Earlier this month a Pakistan court had banned access to Facebook due to the Draw A Mohammad Day page, the ban in question will remain in effect till May 31, 2010.

The Millatfacebook or MFB developers are working to add more features to the site to make it similar to those of Facebook. There are several similar features right now including Wall, Friends and more.

As per reports the site already has over 4,300 users in the page few days, most of them are Pakistanis. This number may grow further considering that Pakistani Facebook users are on the lookout to catch up with their Facebook friends and aren’t able to do so.

Don’t expect the same Facebook experience on MFB yet, it still has a long way to match the standards of Facebook, this is also reflected by several current users of the site.


Five months after it first announced coming privacy changes this past summer, Facebook is finally rolling out a new set of revamped privacy settings for its 350 million users. The social networking site has rightly been criticized for its confusing privacy settings, most notably in a must-read report by the Canadian Privacy Commissioner issued in July and most recently by a Norwegian consumer protection agency.
The new changes are intended to simplify Facebook's notoriously complex privacy settings and, in the words of today's privacy announcement to all Facebook users, "give you more control of your information." But do all of the changes really give Facebook users more control over their information?
so we want to know about advantage or disadvantage of new privacy, the changes will actually reduce the amount of control that users have over some of their personal data.
Not to say that many of the changes aren't good for privacy. But other changes are bad, while a few are just plain ugly.

The Good: Simpler Privacy Settings and Per-Post Privacy Options

The new changes have definitely simplified Facebook's privacy settings, reducing the overall number of settings while making them clearer and easier for users to find and understand. The simplification of Facebook's privacy settings includes the elimination of regional networks, which sometimes would lead people to unwittingly share their Facebook profile with an entire city, or, as Facebook's founder Mark Zuckerberg explained in a recent open letter, an entire country.

The Bad: EFF Doesn't Recommend Facebook's "Recommended" Privacy Settings

Although sold as a "privacy" revamp, Facebook's new changes are obviously intended to get people to open up even more of their Facebook data to the public. The privacy "transition tool" that guides users through the configuration will "recommend" — preselect by default — the setting to share the content they post to Facebook, such as status messages and wall posts, with everyone on the Internet, even though the default privacy level that those users had accepted previously was limited to "Your Networks and Friends" on Facebook (for more details, we highly recommend the Facebook privacy resource page and blog post from our friends at the ACLU, carefully comparing the old settings to the new settings). As the folks at TechCrunch explained last week before the changes debuted:

The Ugly: Information That You Used to Control Is Now Treated as "Publicly Available," and You Can't Opt Out of The "Sharing" of Your Information with Facebook Apps.Foe more info you can read full article ...


US electronics giant Apple Inc has won a trademark infringement suit against a Chinese corporation that used a logo similar to the US company's distinctive symbol.

The logo was used on the Chinese firm's products and website and it was too similar to its own.

Apple Inc registered the trade name "Apple" and the apple logo when it entered China's market in 1993 and has exclusive trademark rights to 2013.

Copyright infringement remains widespread in China, despite years of pressure by foreign companies and governments on Beijing to crack down.

Foreign governments say such infringement costs overseas companies billions of dollars in sales each year.

Most business organisations store their sensitive information in computer systems. This information is targeted by rivals, criminals and sometimes disgruntled employees.
A very good looking woman went to meet the system administrator (sysadmin) of a large company. She interviewed the sysadmin for a “magazine article”.
During the interview she flirted a lot with the sysadmin and while leaving she “accidentally” left her pen drive at the sysadmin’s room. The sysadmin accessed the pen drive and saw that it contained many photographs of the lady. He did not realize that the photographs were Trojanized! Once the Trojan was in place, a lot of sensitive information was stolen very easily.
Who is liable? The persons who steal the information as well as the persons who misuse the stolen information.


Credit cards are commonly being used for online booking of airline and railway tickets and for other ecommerce transactions. Although most of ecommerce websites have implemented strong security measures (such as SSL, secure web servers etc), instances of credit card frauds are increasing.
The scenario of this case ,The victim’s credit card information is stolen and misused for making online purchases (e.g. airline tickets, software).
Who is liable in this case? All persons who have stolen the credit card information as well as those who have misused it.
The suspect would install keyloggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim.
Unsuspecting victims would use these infected computers to make online transactions. The credit card information of the victim would be emailed to the suspect.

An independent developer has demonstrated a way of installing Google's Android smartphone operating system on the Apple iPhone.
David Wang, known as 'planetbeing' in the iPhone hacking community, posted a YouTube video demonstrating a working iPhone that is able to boot and run applications within Android.

When you’re using Internet Explorer 6 (IE 6), you’re putting you and your clients’ security at risk.

There are two main problems with IE 6:

1) IE 6 not secure.

You may have heard that you can avoid viruses by not clicking on strange files or downloading strange programs. That’s true some of the time, but by using a browser like IE 6 you can contract a virus merely by visiting an infected web page. Hackers often infect otherwise reputable websites as a way to spread viruses. Once you get a virus, everything on your computer, from your credit card information to your clients’ confidential files, are at the mercy of hackers.

2) IE 6 doesn’t render web pages properly because many websites do not support it.

Youtube, Google, Amazon…the list goes on. Major companies are dropping support for IE 6 left and right. What this means is that if you visit a website that doesn’t support IE 6 and you’re using it, the website won’t function properly. It’ll be like viewing the world through broken glasses.


A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust enough to fend off hackers attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe has proved to be complex, error-prone, expensive, and inefficient for many large-networked organizations, according to a research team writing in the International Journal of Internet Protocol Technology.

India has risen to the fifth spot in the world's cybercrime ranking for 2009 from the 11th spot in 2008 and now only lags behind the US, China, Brazil and Germany and also shows that cyber criminals are now increasingly going for Web-ased attacks using social-networking sites compared to the earlier dependence on the e-mail route used to steal information about credit cards and bank accounts.


Orkut Fake Profile cases

Orkut.com is a very popular online community and social networking website. Orkut users can search for and interact with people who share the same hobbies and interests. They can create and join a wide variety of online communities. The profiles of Orkut members are publicly
viewable.
1. A fake profile of a woman is created on Orkut. The profile displays her correct name and contact information (such as address, residential phone number, cell phone number etc). Sometimes it even has her photograph.
The problem is that the profile describes her as a prostitute or a woman of “loose character”
who wants to have sexual relations with anyone. Other Orkut members see this profile and start calling her at all hours of the day asking for sexual favours. This leads to a lot of harassment for the victim and also defames her in society.
2. An online hate community is created. This community displays objectionable information
against a particular country, religious or ethnic group or even against national leaders and
historical figures.
3. A fake profile of a man is created on Orkut. The profile contains defamatory information
abut the victim (such as his alleged sexual weakness, alleged immoral character etc)


A hacker named Kirllos has a rare deal for anyone who wants to spam, steal or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices.

Researchers at VeriSign's iDefense group recently spotted Kirllos selling Facebook user names and passwords in an underground hacker forum, but what really caught their attention was the volume of credentials he had for sale: 1.5 million accounts.

IDefense doesn't know if Kirllos' accounts are legitimate, and Facebook didn't respond to messages Thursday seeking comment. If they are legitimate, he has the account information of about one in every 300 Facebook users. His asking price varies from $25 to $45 per 1,000 accounts, depending on the number of contacts each user has.

To date, Kirllos seems to have sold close to 700,000 accounts, according to VeriSign Director of Cyber Intelligence Rick Howard.

Hackers have been selling stolen social-networking credentials for a while -- VeriSign has seen a brisk trade in names and passwords for Russia's VKontakte, for example. But now the trend is to go after global targets such as Facebook, Howard said.

Facebook has more than 400 million users worldwide, many of whom fall victim to scams each day. In one such scam, criminals send out messages from a compromised account, telling friends that the account's owner is trapped in a foreign country and needs money to get home.

In another, they send Web links that lead to malicious software, telling friends that it's a hilarious or sensationalistic video.

"People will follow it because they believe it was a friend that told them to go to this link," said Randy Abrams, director of technical education with security vendor Eset. Once the malware gets installed, criminals can steal more passwords, break into bank accounts, or simply use the computers to send spam or launch distributed denial of service attacks. "There's just a plethora of things that people can do if they can trick people into installing their software," he said.

Kirllos' Facebook prices are extremely cheap compared to what others are charging. In its most recent Internet Security Threat Report, Symantec found that e-mail usernames and passwords typically went for between $1 to $20 per account -- Kirllos wants as little as $0.025 per Facebook account. More coveted credit card or bank account details can go for much more, ranging between $0.85 to $30 for credit card numbers to $15 to $850 for top-quality online bank accounts.

Non-traditional communications devices such as smartphones and game consoles pose a particular problem to law enforcement agencies trying to milk them for forensic data that reveals criminal activity, attendees were told at the 2010 Computer Forensics Show in New York City.
"Forensic tools for cell phones are in their infancy," says Stephen Riley, a forensic examiner with the FBI's Computer Analysis and Response Team. "There's lots of different carriers, different phones, different cables - just try to keep up."Smartphones can communicate via SMS, MMS, mobile e-mail, mobile internet access, VoIP and traditional cellular voice networks, Riley says, making each machine a potential treasure trove of information but also a nightmare maze of possible proprietary technologies to unlock it.
The ready availability of cell phones is also a problem. Searches of suspects' residences can turn up drawers-full of cell phones that are no longer used but never thrown out. Yet they can demand valuable forensic time.

Experts estimate 10 to 15 percent of personal computers in the U.S. have been taken over and harnessed together into powerful illegal computing tools called "botnets." Some experts believe these botnets are so massive that the criminal hackers who run them have more computing power than the U.S. government.

Kevin Mitnick, often incorrectly called by many as god of hackers, broke into the computer systems of the world's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Microsystems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering.

what is computer hacking in cyberspace?
Criminal computer hacking is any act committed by a person with detailed knowledge of computers who uses this information to accomplish acts of terrorism, vandalism, credit and debt card fraud, identity theft, intellectual property theft, and other forms of computer-related crimes. Computer hacking always involves some type of infringement on the privacy of others or some type of damage to computer-based property. Computer hacking can be done for numerous reasons, including the commission of fraudulent acts intended to secure financial gain at the expense of businesses or consumers

What is Cyberspace? Who Governs and is Governed in Cyberspace? How Does Law Operate in Cyberspace?

The law pertaining to the Internet both profoundly shapes and is shaped by the decentralized, rapidly developing, and even anarchic technology of digital networks. For example, in order to determine whether governments have employed "least restrictive means" in their regulation of Internet speech, reviewing courts must pinpoint the most legally pertinent technological (as well as economic and social) characteristics of the Internet -- characteristics that are often in rapid flux. Conversely, legal regulation of the Internet can exert pressure on technology, by imposing formal state-sanctioned liability rules that favor one form of technological development over another. This section begins by examining some of the legally salient technological characteristics of cyberspace.

This section also addresses some of the basic questions of who governs and is governed by the Internet. Internet technology and social organizations affect the nature of group identity and power-sharing (expressed through formal governments and laws) as well as individual social and political identities. For example, the Internet is arguably regulated as much by non-state entities (such as independent service providers or bodies that set technical standards) as it is by formal sovereign governments. Moreover, individual identities can be transformed through the anonymity, malleability and easy access to public space that are pervasive features of the technology. Private consensual arrangements among individuals and groups, whether by contract or custom, also substitute for formal governance mechanisms.

Finally, law itself is problematized by Internet technology. Traditionally, law involves a centralized sovereign actor that exerts power within its territorial boundaries. However, several features of the Internet combine to disrupt this framework: the instantaneous extraterritoriality of most acts, the lack of centralized power, and the fluidity of geographic or political boundaries. To a much greater degree than with other technologies, the design choices made by engineers will also act as a type of "regulation." This section thus concludes with some of the challenges posed to the concept of law by Internet technology.

I want to write about cyberlaw in this blog so what is cyberlaw ?
Cyberlaw is a term that encapsulates the legal issues related to use of communicative, transactional and distributive aspects of networked information devices and technologies . It is less a distinct field of law in the way that property or contract are, as it is a domain covering many areas of law and regulation. Some leading topics include intellectual property, privacy, freedom of expression, and jurisdiction.

Hi ,This is Mehran I create this blog to write something about cyberlaw.
thanks
Mehran

Cyberlaw

Cyberlaw

About this blog

This blog is about cyberlaw

Labels

About Me

My photo
Hello my friends my name is Mehran ,I'm going to write about cyberlaw. This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the web-log owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this web-log and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Followers

Labels


Labels

Search This Blog


Labels