logo

Law of Internet: Legal Issues and Protection

   

Added on  2023-01-09

6 Pages1394 Words60 Views
Law of internet
Law of Internet: Legal Issues and Protection_1
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Question 1. Determining if there is need to devise new rules and examine the law of horse.....1
Question 2. Examines the legal issues which are associated with the law of internet................2
Question 3. Signifies the protection of the liability from the defamation within the section 230
should or shouldn’t be adopted within the jurisdiction...............................................................2
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
Law of Internet: Legal Issues and Protection_2
INTRODUCTION
The law of internet is mainly referred to as how the legislations and legal principle tends
to effectively govern how to effectively use the internet (Shimizu, 2020). This study will
highlight on determining if there is need to devise new rules and examine the law of horse. This
study also examines the legal issues which are associated with the law of internet. Furthermore,
this study also critically signifies the protection of the liability from the defamation within the
section 230 should or shouldn’t be adopted within the jurisdiction.
MAIN BODY
Question 1. Determining if there is need to devise new rules and examine the law of horse.
Cyber crime is considered to be as one of the key legal issue which has been faced by the
individual on the internet. The cyber crime is considered to be the use of the various illegal ends
which eventually results in the commitment of the fraud (Tsuji, 2018). The cyber crime in turn
results in the trafficking of the child pornography, stealing of the personal information over the
internet. The law of horse tends to significantly define that, there are various set of legal
legislations and studies. There are various set of significant internet laws which mainly includes
Federal Wire Fraud Statute, Child Pornography Prevention Act of 1996, Computer Fraud and
Abuse Act, Electronic Communications Privacy Act, GDPR act, etc. The general data protection
regulation act comply with seven key principles which includes consent, right to access, right to
erasure, breach notification, data portability, data protection officers and privacy by design
(Zeller, B and et.al., 2019). Consent principle tends to state that affirmative and clear consent is
necessary to process the individual data. The right to access principle states that the individual
person has the right to know which data has been held and which data has been used and why it
has been used. The third principle related with the right to erasure where the individual may
request on deleting the data and further processing is not considered to be justified. The data
portability principle states that individual may want to transfer the key information to another
company. Breach notification states that both individuals and supervisor authorities must be
effectively notified within 72 hours in case of breach of data. Privacy by design principle tends
to state that the data protection must be effectively incorporated within the system (Kiyohara,
2017). Proper anonymization and encryption of data must be built. The principle of data
protection officers states that large organisation must accurately designate data protection officer
1
Law of Internet: Legal Issues and Protection_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Fraud Examination and Investigation Techniques
|4
|722
|445

Analysis of Information Security Issues - OPM Data Breach
|5
|842
|267

Data Ethics and Privacy
|10
|2112
|97

Legal Aspects of Online Criminal Speech and Sexual Images of Children
|13
|3995
|50

The Ethics of Dead People Online and the Right to Be Forgotten
|8
|1968
|122

Challenges Faced by Uber in Business Ethics and Social Responsibility
|12
|3641
|481