Welcome to Cybercrime Laws!
This blog is part of my cybercrime module taught currently at the University of Essex (UK). I see it as a database with which I, and others, can work.
The updates are not daily, partly because of lack of time, partly because it is easier to group similar subjects in one post after a week or so. RSS feeds (and sharing) are available.
The original blog was on Blogger (blogspot.com), but for maintenance purposes, transfer to Wordpress became necessary. The original blog is still up and running (I just import/export posts)
Archives
- May 2013
- February 2013
- September 2012
- July 2012
- June 2012
- May 2012
- March 2012
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- February 2011
- December 2010
- November 2010
- October 2010
- September 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
Categories
- Anonymity
- Anonymous and Co
- censorship
- Cloud_computing
- Corporate Responsibility
- Council of Europe
- Countries – China
- Countries – France
- Countries – UK
- Countries – US
- Cyberwar
- Data retention
- Discipline
- Drones
- Education
- Encryption
- EU policy
- Filtering
- Freedom of speech
- Gaming
- General – Cost(s) of cybercrime
- General – Criminalisation
- General – Cybercrime patterns
- General – Legal/non legal responses to cybercrime
- Human Rights
- Information – reliability
- Investigation-1- Police forces (training)
- Investigation-2- Interception of communication
- Investigation-3- Miscelleanous
- Investigation-4- Searches and seizures
- Investigation-5- Use of technology(ies)
- Jurisdiction
- Offences – Child pornography
- Offences – CMA s.3A
- Offences – Conspiracy
- Offences – Defamation
- Offences – Forgery
- Offences – Fraud
- Offences – Hacking (unauthorised access)
- Offences – Hacking – Mr. McKinnon (Nasa hacker)'s case
- Offences – Harassment
- Offences – Incitement/provocation
- Offences – Obscenity
- Offences – Piracy
- Offences – Terrorism
- Offences – Theft
- Offences – Unauthorised 'modification' (and co)
- Offences – Violence against the person
- Prevention – Security
- Privacy
- Providers as law enforcement agents
- Providers' liability
- Scarcity
- Sentencing
- Social networking
- Social networking – Facebook
- Social networking – Twitter
- Spamming
- Surveillance
- Technology – neither good or bad but never neutral
- Trial – Evidence
- Trial – Judges
- Trial – Jury
- Trial – or mediation
- Trial – Right to
- Trial – Training of judges
- Uncategorized
- United Nations
- Virtual Worlds
Category Archives: Social networking – Facebook
A threat on Facebook: a crime?
Should Making A Threat On Facebook Be A Crime? | Techdirt. 22 August 2012 the answer is yes as long as the circumstances fit within the legal definition of the crime. it is a question as much of common sense … Continue reading
The use of social networking: crime and no crime
Court Finds Law Blocking Teachers From Friending Students ‘Staggering’; Blocks Implementation | Techdirt. 29 August 2011 Even though Facebook must be used with precaution by teachers, if they link with their pupils/students, to ban it outright becomes silly. It is … Continue reading
Riots, social networks sites and crime
Facebook riot posts lead to four-year jail terms | Regulation | ZDNet UK. 17 August 2011 That they were found guilty is not too much of a surprise. But that the offenders got 4 years of imprisonment is disproportionate and … Continue reading
Juritel : le web juridique : droit et internet, avocat en ligne – Huissier
Juritel : le web juridique : droit et internet, avocat en ligne – Huissier. Facebook n’est pas privĂ©; Facebook is not private – Newsletter november 2010 French employment tribunal decided that the employer could fire three employees who made unfortunate … Continue reading
Posted in Anonymity, Social networking - Facebook
Leave a comment
Privacy infringement
The two infringements make you wonder what non-famous companies do and how they are controlled: Google Admits It Was Accidentally Collecting Some Open WiFi DataData (TechDirt, 14 May 2010)EU watchdog slams Facebook privacy settings (Euractiv, 14 May 2010) and new … Continue reading
Social networking and risks
Social networks put careers at risk, survey finds (Euractiv, 1 February 2010) with employers looking on the internet profile of applicants! Question of education about impact of the internet in people’s lives. Social networks put minors at risk, EU warns … Continue reading
Hyping issues up: distortions when it comes to internet
1 – “The Real Problem With Internet Comments Isn’t Anonymity” (TechDirt, 12 April 2010). That I would agree; people before internet could be anonymous for the better or for the worse (blackmail…). They could also be discovered and were accepting … Continue reading
The power of images and data
Three articles, all connected around several themes. The first one is about Chatroulette’s site which works on the basis of logging in for random chats with people all over the world (well, at least that is what they tell you). … Continue reading
Different issues on fraud and malware and a few arrests/suspicions
Well, I would have thought they were an obvious target? “Online bank fraud targeting corporate accounts” (ZDnet.co.uk, 04 November 2009) “Facebook denies mass hijack was down to flaw” (ZDnet.co.uk, 11 November 2009) but a few weeks later, decides to change … Continue reading
Surveillance
“US gov’t agencies sued over Facebook surveillance” (ZDnet.co.uk, 02 December 2009) Different watchdogs decided to ask the US federal government for their guidelines in how they use social networks to monitor citizens’ behaviours. A similar policy would not be amiss … Continue reading