7 Sep 2022

71

Laws of Cyberspace: The Case of Kidshare.net

Format: Other

Academic level: College

Paper type: Research Paper

Words: 391

Pages: 1

Downloads: 0

Kidshare.net violated a number of federal statutes due to unauthorized access to the computer network of another party leading to exposure of critical details. For example, the social networking site committed hacking, piracy and identity theft. Therefore, John can pursue the California Identity Theft Statute, the Federal Computer Fraud and Abuse Act, and the Company Policies and Procedures as legal actions intended to curtail unauthorized access and use of data without the consent of the owner. Hence, John has the reason to subject Kidshare.net to criminal prosecution with reference to federal and/or state laws. 

The Kidshare.net committed hacking as one of the prohibited computer crimes since it gained access of Erin’s computer system without notifying the latter (HG.org., 2018). The intrusion facilitated the introduction of malicious viruses to enhance interference with the computer network to steal internet passwords, and personal details of other Erin’s classmates. Again, the Kidshare.net committed piracy offence whereby it circulated the personal data obtained to third parties for to obtain illegal profits in contrast to the recommendations of the law. Finally, identity theft is another offence that the Kidshare.net committed with respect to disclosure of social security numbers and home addresses of the learners (HG.org., 2018).. This offence is sometimes related to email phishing in other contexts whereby the personal information of individuals is secretly obtained in copycat websites. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Therefore, through the California Identity Theft Statute, John can sue the social networking site since it did not notify Erin about the breach of personal information. Additionally, the Federal Computer Fraud and Abuse Act can help John regarding the theft of computer data (Reuters, 2018). This act prohibits theft of any personal information through piracy and hacking activities on an online basis. It further prohibits unauthorized access and trafficking in computer passwords with the aim of obtaining private information by third parties. Finally, the company policies and procedures is a vital statute as regards the clear procedures on how computer data can be obtained in specific circumstances. This further involves the acquisition of computer data by third parties through their official websites rather than illegally getting access to the same (Reuters, 2018). Hence, the Kidshare.net could suffer massive consequences including but not limited to fines of up to $15, 000 for the felony of accessing and circulating personal data of others illegally in the computer system. Imprisonment of up to 5 years is another possible consequence of the responsible individual operating the Kidshare.net’s website. 

References 

HG.org. (2018). Computer Crime Law. HG.org. Leal Resources. Retrieved 28/7/2018 from https://www.hg.org/computer-crime.html 

Reuters, T. (2018). The Law Protects The "Unauthorized" Access To Computer Data: How You Can Shape The Law While At The Same Time Protecting Your Data. FindLaw for Legal Professionals. Retrieved 28/7/2018 from https://corporate.findlaw.com/law-library/the-law-protects-the-unauthorized-access-to-computer-data-how.html 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Laws of Cyberspace: The Case of Kidshare.net.
https://studybounty.com/laws-of-cyberspace-the-case-of-kidsharenet-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 441

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 117

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration