What are the salient features of this act?
- Illegal access - Unauthorized access (without right) to a computer system or application.
- Illegal interception - Unauthorized interception of any non-public transmission of computer data to, from, or within a computer system.
- Data Interference - Unauthorized alteration, damaging, deletion or deterioration of computer data, electronic document, or electronic data message, and including the introduction or transmission of viruses.
- System Interference – an intentional disruption of a certain system without authority by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or computer program, electronic document, or electronic data message and transmission of viruses.
- Cybersex – sexual arousal using computer technology, especially by wearing virtual reality equipment or by exchanging messages with another person via the Internet.
- Child Pornography – pornography related to children (below 18 years old).
- Identity Theft – unauthorized usage of system accounts like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.
- Computer-related Fraud - Unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent.
- Misuse of Devices – The use, production, sale, procurement, importation, distribution, or otherwise making available, without right.
Can you relate some provisions of the Law on your past experiences as an IT student?
I do not have any experiences that violates this law. Because if I will violate some of this law, the government can trace me anytime and be arrested anytime. But I'm thinking that I already violated this law before it was implemented, like using other accounts for spying and getting some valuable data but the owner granted my permission to use his account.

No comments:
Post a Comment