Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Monthly Archives: October 2009
Three Economic Nobel Laureates In A Row Recognizing Power Of Infinite Goods | Techdirt
Three Economic Nobel Laureates In A Row Recognizing Power Of Infinite Goods | Techdirt: “Three Economic Nobel Laureates In A Row Recognizing Power Of Infinite Goods”
Posted in Offences - Theft, Virtual Worlds
Leave a comment
Sued Over Twitter Message? Can You Defame Someone In 140 Characters Or Less? | Techdirt
Sued Over Twitter Message? Can You Defame Someone In 140 Characters Or Less? | Techdirt apart from the issue of the audience, there is the issue of the message contents: 140 characters means strong language to be used in order … Continue reading
Burglary outcomes
How silly can some be? to burglar and then bosts on line by contacting the victims?! Home Burglar Returns To Taunt Couple Via Facebook? (TechDirt, 17 August 2009)
Posted in Social networking
Leave a comment
ISP & co Liability
Google Not Liable For ‘Defamatory’ Search Result Snippets In The UK (TechDirt, 17 July 2009)
Posted in Providers' liability
Leave a comment
Fraud and Russia
Self-explanatory. Soca: Russian cyber gang bribed police (ZDnet.co.uk, 22 October 2009)
Posted in Countries - UK, Offences - Fraud
Leave a comment
Virtual property or no property?
with obviously its repercussion on criminal law which is based on the notion of having property rights… Why Virtual Property Doesn’t Make Sense (TechDirt, 17 August 2009) Linden Lab Sued Over Copied Virtual Goods (TechDirt, 18 September 2009)
Posted in Virtual Worlds
Leave a comment
sex offenders and the use of social networking
Illinois Says Sex Offenders Can’t Use Social Networks (TechDirt, 13 august 2009)
Posted in Sentencing
Leave a comment
Well, I would not put it that way, but the point is valid in legal terms. ID theft is theft only to the extent that the information has been accessed, but it is not to be confused with the use … Continue reading
Posted in Uncategorized
Leave a comment
Funny side of sentencing
I found it really funny: a spammer realising that the fine cannot be paid by his insurance!Spammer Discovers His Insurance Policy Doesn’t Cover $6 Million Spam Fines (TechDirt, 3 August 2009)
Posted in Sentencing, Spamming
Leave a comment
Use of Twitter in courts
Again, the issue about adapting or not juries to the 21st century, i.e. in a world where writing is predominant and oral transmission of information does not represent anymore 95% of the transmission of informationMichigan Supreme Court Issues New Stop … Continue reading