Friday, 8 January 2021

INFORMATION TECHNOLOGY LAW AND CYBERCRIME PROFESSIONAL ENGLISH IN USE FOR LAW

 

PROFESSIONAL ENGLISH IN USE FOR LAW

44. INFORMATION TECHNOLOGY LAW AND CYBERCRIME

 

A

Computer security

Pieter and Bieman, a legal practitioner specialising in information technology, is speaking at a Chamber of Commerce lunch.

‘I’m sure you’d all agree that the development of information technology and e-commerce has presented exciting business opportunities. However, the increasing sophistication of the systems and applications available to end users has created significant legal challenges to individuals, companies, the legislature and legal advisers. The technology necessary to access the Internet has also enabled innovative illegal activities. You’ll be aware that these include the breach of computer security and unauthorised access to a computer commonly known as hacking.


B

Cybercrime

‘There are cybercrimes that may affect you personally, such as credit card fraud online, commonly known as credit card scams and identity (ID) theft, when financial benefit is obtained by deception using stolen personal information. In the USA, fraudsters, as they’re known, who use a stolen identity to commit new crime, may be charged with what’s known in the States as aggravated ID theft. The Council of Europe Cybercrime Treaty, also signed by US and Japan, has the aim of international co-operation and mutual assistance in policing.


C

Data protection

‘The way you collect, store, and distribute information that constitutes personal data on identifiable individuals is now subject to Data Protection legislation. If, for example, you ask potential customers to supply their address details via the web in the process of requesting further information concerning your business, you should also provide the data subject with information about the purpose of collecting the data, the period for which


 

EXERCISES

44.1

Make word combinations from A opposite using words from the box.


44.2

Are the following statements true or false? Look at A opposite to help you. Use appropriate word combinations from44.1 to explain your answers.

1. People who use computer applications are known as hackers.

2. It’s a legal challenge to gain unauthorised access to a database.


44.3

Complete the article. Look at B opposite to help you. There is more than one possibility for one of the answers.

Pharming is taking over from phising

International cyber-crooks have found a new way to rip off the public

Fraudsters find it surprisingly easy to operate credit card (1) __________ over the Internet. (2) __________ tricks consumers into providing



44.4

Find more formal expressions in C opposite for:

1. a human person about whom data is stored

2. law which governs the use of computer stored information about individuals



ANSWER KEY


 

No comments:

Post a Comment

thank you for visiting my blog and for your nice comments