English French German Portuguese Russian Spanish
You are here Home
Tuesday, 25 June 2013 14:39

Computer Laws Featured

WRITTEN_BY  Administrator
Rate this item
(0 votes)

Computer Laws

Question 1

  1. Penalties for Breaking the Computer Fraud and Abuse Act of 1986.

An individual found guilty of breaking subsection (a) of this law is liable to a prison term of ten years or a sanction. This occurs when the offender accesses information from computer systems without authorization. The second level of punishment is a sentence of one year or a sanction for an individual who is guilty of attempting to access data from computer systems without permission (Maras, 2011).

  1. Penalties for the Florida Criminal Use of personal Identification Information.

The first level of punishment in this law results when an individual uses or attempts to use private information from another person in a fraudulent manner. This constitutes third degree felony and is punishable through a sentence of five years. If the offence constitutes a second degree felony, the individual is subject to a prison sentence of fifteen years.

  1. Comparison and Contrast.

The levels of punishment in both cases are similar in terms of the length of a jail sentence. The jail sentence in both cases extends from one year to fifteen years. However, the levels of punishment are different in that the Abuse Act provides for fines while the second law does not.

 Question 2

Both the laws are clear because they provide an outline of the specific punishment levels. The laws are also clear on the scenarios or actions that constitute an offence. The punishment levels for the two laws are appropriate for people who violate them. In order to deter the access of confidential information, the law should impose harsher sentences. For instance, the criminal use of personal information should comprise of a sentence of more than twenty years (Maras, 2011).


Question 3

Agencies in Maryland: Identity Theft Resource Center and Internet Crime Complaint Center

Reporting a Computer Crime:

The initial step encompasses passing the information to the State Attorney’s Office. The state attorney then examines the validity of the complaint. This helps in determining whether there are sufficient grounds for prosecution. If the complaint is valid, the state attorney initiates the legal suit. Additionally, the state has numerous resources that offer assistance to computer crime victims. Such resources include the Cyber Crime Complaint Center and the Internet Theft Center (Maras, 2011).

 Question 4

The Cyber Security Enhancement Act (CSEA)

Although the enactment of this law took place in 2002, the state has not been enforcing it accordingly. It is thus essential to implement this law in the state. There are various reasons behind this. Firstly, incidences of cyber crime in this state have increased. Such cases involve the unauthorized access to networks and hacking among others. The current computer laws in the state have not been effective in dealing with this challenge. It is thus necessary to implement a law that is capable of dealing with the challenge of cyber crime in the state. The CSEA has an excellent framework for dealing with these types of cases (Maras, 2011). It has an effective framework for punishing or penalizing cyber criminals.

 Information Technology Strategies.

Question 5

Two of the most notable strategies for economic development are innovation and communications. Economic factors have numerous implications of the strategies used by the government to spearhead economic development. Firstly, if the economy is performing poorly, the government must develop policies that can accelerate economic growth. Information technology is among the most efficient ways of accelerating economic growth. Through information technology, the government attains excellent standards of innovation in the economy. The second scenario involves a situation in which the government wants to maintain the existing standards of economic development. Similarly, information technology is an essential strategy for such situations (Maras, 2011).

The availability of resources is another critical perspective that influences the strategies used by the government. The implementation of some information and technology strategies requires a lot of resources. Without adequate resources, the implementation framework for such strategies is not effective. On the other hand, some information and technology strategies require minimal resources. Consequently, the implementation of such strategies is not complex. The technological advancements available in the economy also influence the types of strategies. It is difficult to implement some strategies without the availability of some technological standards. For instance, some strategies are dependent on the availability of internet coverage.

 Question 6

The innovation and communication strategies appear complementary to one another.  The implementation of these strategies might occur simultaneously because they relate to one another. In order to attain innovation, it is essential to have an effective communication framework. On the other hand, the efficiency of communication strategies is dependent on the existing innovative framework. These perspectives indicate that innovation and communication strategies are complementary to one another.

 Strategy Methodology.

Question 7

The economic factors have extensive implications on the assessment of the IT organization at the enterprise level. In the first step, the economic factors help in evaluating the effectiveness of the IT system. Depending on the outcome of the assessment process, the relevant adjustments are put into place. During the second step, the economic factors help in determining the efficacy of the implementation process. At the third step, the economic factors help in streamlining the quality of the quality of the entire economic framework.

 Question 8

People are the most fundamental elements of strategy. Although the process and technology are also vital, all aspects would be more or less meaningless without the input of people. The role of people as critical elements of strategy is evident in numerous perspectives. Firstly, it is the responsibility of the people to identify the need for strategy. This is the most critical step in the formulation of strategy. Secondly, people must identify a set of alternatives which conform to the requirements of the strategy. The most appropriate strategy emanates from this set of alternatives.

After identifying the most appropriate alternative, the next step involves the implementation. Individuals form an integral component on any implementation framework. It is the role of individuals to pinpoint the inputs necessary for the implementation framework. The effectiveness of strategy depends on a combination of many factors. However, the allocation and distribution of resources is a critical element. Even when sufficient resources are available, the overall consequences are reliant on the mechanism for resource allocation. If the strategy emphasizes on technology, the effectiveness of the framework decreases. This perspective indicates that people affect all other systems. Coordination among the involved individuals is also crucial. The strategic goals are not attainable if there lacks sufficient coordination among the involved individuals. In order to boost the coordination, communication technology would come in handy.


Maras, M. H. (2011). Computer forensics: Cybercriminals, laws and evidence, Sudbury,MA: Jones & Bartlett Learning


Last modified on Tuesday, 25 June 2013 14:44
Trusted Site Seal SSL Certificate Provider SSL