Cyber Law Project: Analysis of Cyber Law for University SMS

Verified

Added on  2023/02/01

|20
|1040
|29
Project
AI Summary
This project examines cyber law principles and their application to a student management system (SMS) within a university setting in New South Wales, Australia. It begins with an introduction to cyber law, followed by an overview of the university's plan to implement an in-house built SMS. The project then outlines the legal obligations of the university under various laws, including the Cybercrime Act 2001 and the Privacy Act 1988. It explores regulations set by the Australian Cyber Security Centre and the Australian Cyber Security Commission, detailing requirements for software usage, data security, and password protocols. The project also discusses various cybercrimes as defined in the Crimes Act 1914 and concludes with a summary of the importance of cyber law and the need for continuous updates and amendments to protect information in the digital age. References are provided at the end.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber Law
Project
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Content
Introduction
Overview
In house built system
Student management system (SMS)
Various crimes as provided in
Crimes Act, 1914
Obligations of University A under
various types of laws
Non-compliance
Regulations by Australian Cyber
Security Commission
References
Document Page
Introduction
Cyber law is a branch of legal system which
is applicable on the matters related with
internet, cyberspace and related areas. It
is wider in context as it provides legal
provisions governing freedom of
expression, access to and usage of
internet and online privacy.
Document Page
Overview
University A in NSW, Australia university to
implement a whole new Student
Management System to have better
management of operations. This fulfils
variety of requirements like improved
compliance, better response of University
to market conditions, to improve student
experience and many more.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
In house built system
This involves activities whereby a product is
produced by an entity within the premises
of an organization. In this process, a
company does not rely on outsourcing.
Employees of the organization are used to
build the product.
Document Page
Student management system (SMS)
It is a software which is programmed to
manage routine operations of school and
colleges. It contains information about
every student which is important. There are
software like SAP, J2E etc. which are used
for designing the software package that can
fulfil needs of clients.
Document Page
Cyber system
There are other considerations apart from
cost which hold importance such as
legislation applicable on Cyber
system. Software and internet are two
components which are used in SMS
for efficient working.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Regulations
There are legal provisions which must be
complied with in order to avoid legal
consequences. Australian Cyber
Security Centre has provided certain
requirements which should be there
before proceeding with development of
SMS, these are as follows:
Document Page
Australian Cyber Security Centre Regulations
Expertise to use the software by a person who is capable and equipped with
adequate knowledge and skills to handle and work on the system.
Information about number of laws applicable on data that will be contained in
the system.
Adequate security for protecting hacking, phishing or any other cyberattacks.
Document Page
Various crimes as provided in Crimes Act, 1914
Hacking: Unauthorised access into a
computer or computer networks. Person
involved in this illegal activity is known as
hacker. It can change security features and
make the system weak.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Obligations of University A under various types
of laws
Cybercrime Act, 2001: Obligations of University A under this act are as follows:
Not to allow any act which is unknown related to premises, computers, or
telecommunications services within the University.
To gather information which can help with the whole system.
To obtain a certificate from prescribed authority certifying that all the formalities have
been complied with and security has been incorporated.
Document Page
Usages of Information technology
The usages of Information technology has
increased in the past few years due to
which people have become aware about
pros and con of it. A work can be done
easily and accurately with the use of
software.
Document Page
Non-compliance of any of the obligations under this
Act will amount to offences which have penalties
Unauthorised modifications of information which has caused or likely to cause
impairment, any person guilty will be punished for a maximum of 10 years
imprisonment.
Unauthorised impairment of electronic communication who has committed this offence
will be punished with imprisonment of 10 years.
Unauthorised access to, or alterations of or restriction of data will held a person liable for
imprisonment of 2 years.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Privacy Act, 1988
It holds legal provisions which are directed towards personal information about individuals.
University A has to fulfil the following obligations which are mentioned below:
There is a requirement of development of internal privacy regulations.
The telecommunications should be effective to have efficient flow of information.
Any kinds of criminal records and anti money laundering should be notified.
Document Page
Regulations by Australian Cyber Security
Commission
All users of software in the system should resent password for reducing risks of
credential compromises.
Password must be lengthy and complex to decrease chances of brute force attack.
Implementation of lockout for multiple failed logins attempts.
In case, any unauthorised access has been noticed, the password must be reset or
changed immediately.
Document Page
Laws protecting cybercrimes and attacks
University A should demonstrate all its students
about number of legislations applicable on
it. Furthermore, various terms should be
explained which might have different
meaning. This is to enhance the knowledge
about laws protecting cybercrimes and
attacks.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cyber laws
With the compliance of cyber law, there are
other areas which needs to be concentrated.
Following laws are not sufficient, University
should focus on rules that are additional but
important. All the amendments must also be
considered which might have the potential
impact on working of system.
Document Page
CONCLUSION
From the above report, it has been concluded that with the increase in usage of
internet and relying on computer system have raised need for having laws that will
protect the information. Various legislations which are compulsory to follow have
been enacted to safeguard personal information of individuals.
Document Page
REFERENCES
Ajayi, E. F. G., 2016. Challenges to enforcement of cyber-crimes laws and policy. Journal of
Internet and Information Systems. 6(1). pp.1-12.
Hobe, S., 2017. The IISL Assumes Responsibility for Questions of Cyber Law. German
Journal of Air and Space Law (ZLW). 66. p.647.
Kundi, G. M. and et. al, 2014. Digital revolution, cyber-crimes and cyber legislation: A
challenge to governments in developing countries. Journal of Information Engineering
and Applications. 4(4). pp.61-71.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
THANK YOU
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]