Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Offences – Defamation
Lies, computer detection and humans
Can A Computer Pick Out Fake Online Reviews When Humans Can’t? | Techdirt. 22 August 2011 It is an interesting study for several reasons. First, it seems to say that algorythms can detect some lies (the example here was fake … Continue reading
Offensive behaviours – distortions
Careful WithThat Fake Social Networking Profile; If You ‘Personate’ Someone, You Can Go To Jail(TechDirt, 02 June 2010) – the article is critical of the offence: it should not be criminal to impersonate somebody on Facebook in California. I tend … Continue reading
offensive and harmful content: reaction or education?
We may well be in a transition period where people are not fully understanding that what on the net is not necessarily reliable, accurate and representative of the truth. Therefore it may be more an educational issue than a legal … Continue reading
Interpretation of traditional offences
Three scenari demonstrating how the internet affects the interpretation of criminal law Sexting: no child porn for the US courts“Court Rejects PA DAs Attempt To Charge Teens For Sexting Themselves“, TechDirt, 18 March 2010 – The court is right in … Continue reading
Sued Over Twitter Message? Can You Defame Someone In 140 Characters Or Less? | Techdirt
Sued Over Twitter Message? Can You Defame Someone In 140 Characters Or Less? | Techdirt apart from the issue of the audience, there is the issue of the message contents: 140 characters means strong language to be used in order … Continue reading
Twitter; ID fraud
The story runs as follow. Account was opened in Twitter under La Russa; it was a fake account. Some claimed that under threat of lawsuit, Twitter (the company) closed the account and donated money to charity. Twitter denied the story.Two … Continue reading
Defamation/insult online and disciplinary action
The basis for a disciplinary action is that the context is that of discipline. The offence has been committed within specific area/location (a school, an office, a prison) or in relation to a group often regulated specifically (e.g.: doctors) . … Continue reading
Defamation: civil or criminal matter?
Many legislations have a civil suit and a criminal charge for defamation. The article about Colorado US is interesting in comparison with the proposal in France to stop allowing defamation charges that do not bear for example any hatred.“Does It … Continue reading
Defamation in cyberspace – a reminder
Hardly surprising, but worth a reminder. Diffamation/libel still applies on cyberspace and more importantly, in some countries like France it is a criminal offence and does not engage civil liability. “Reminder: Defamation Still Applies To Bloggers” (29 September 2008)
Defamation, MySpace and fake profiles
Case rejected against those children who created a fake profile of their headmaster; lucky because in some countries like France defamation is a criminal matter not usually a civil law issue like in the US and UK (well criminal law … Continue reading