A
|
Computer security
Pieter and Bieman, a legal practitioner
specialising in information technology, is speaking at a Chamber of
Commerce lunch.
‘I’m sure you’d all agree that the
development of information technology and e-commerce has presented exciting
business opportunities. However, the increasing sophistication of the
systems and applications available to end users has created significant
legal challenges to individuals, companies, the legislature and legal
advisers. The technology necessary to access the Internet has also enabled
innovative illegal activities. You’ll be aware that these include the
breach of computer security and unauthorised access to a computer commonly
known as hacking.
|
B
|
Cybercrime
‘There are cybercrimes that may affect you personally, such as
credit card fraud online, commonly known as credit card scams and identity
(ID) theft, when financial benefit is obtained by deception using stolen
personal information. In the USA, fraudsters, as they’re known, who use a
stolen identity to commit new crime, may be charged with what’s known in
the States as aggravated ID theft. The Council of Europe Cybercrime Treaty,
also signed by US and Japan, has the aim of international co-operation and
mutual assistance in policing.
|
C
|
Data
protection
‘The way
you collect, store, and distribute information that constitutes personal
data on identifiable individuals is now subject to Data Protection
legislation. If, for example, you ask potential customers to supply their
address details via the web in the process of requesting further
information concerning your business, you should also provide the data
subject with information about the purpose of collecting the data, the
period for which
|
EXERCISES
44.1
|
Make word combinations from A opposite
using words from the box.
|
44.2
|
Are the following statements true or false? Look at A opposite to
help you. Use appropriate word combinations from44.1 to explain your
answers.
1. People who use computer
applications are known as hackers.
2. It’s a legal challenge to
gain unauthorised access to a database.
|
|
44.3
|
Complete
the article. Look at B opposite to help you. There is more than one
possibility for one of the answers.
Pharming
is taking over from phising
|
International cyber-crooks
have found a new way to rip off the public
Fraudsters find it
surprisingly easy to operate credit card (1) __________ over the
Internet. (2) __________ tricks consumers into providing
|
|
|
44.4
|
Find more formal expressions in C opposite for:
1. a human person about whom
data is stored
2. law which governs the use
of computer stored information about individuals
|
|
|
No comments:
Post a Comment
thank you for visiting my blog and for your nice comments