Laws that apply once cybercrime crosses national and international boundaries and their importance

Laws that apply once cybercrime crosses national and international boundaries and their importance

 

Various laws apply once cybercrime crosses national and international boundaries. The first law is known as the Convention on Cybercrime Law. This law applies to international borders because it protects computer systems’ integrity by criminalizing unauthorized access to systems using various techniques. This law grants countries the right to develop laws in their domestic jurisdiction to prevent unauthorized access to part of the system by third parties without the right to do so (Siregar & Sinaga, 2021). This act covers a wide array of communication because access includes entering another system through internet attacks and unauthorized access to computers not connected to any network. The other law that governs cybercrime internationally is the commonwealth and computer-related crimes model law (Siregar & Sinaga, 2021). This law makes unauthorized access to personal information punishable with five years in jail, a fine of $10,000, or both.

Consistently, the Convention on Cybercrime Law also covers cybercrime internationally. This law protects data on non-public transmissions by criminalizing unauthorized interceptions. This act protects electronic transfers between two parties in various jurisdictions by protecting their voice conversations or data transfers against illegal tapping or unauthorized recording (Siregar & Sinaga, 2021). This law allows each country to formulate criminal laws against interception without rights. The respective domestic law may outline the punishment that may be meted out against parties that engage in interception with dishonest intent. In this law, interception relates to retrieving electronic data during transfer. This law does not cover access to information stored on a hard disk. Additionally, the term transmission covers all data transfers by telephone, fax, or file transfer (Siregar & Sinaga, 2021). The provisions in Article Three only apply to non-public transmissions, whereby the transmission process is deemed private and confidential.

Lastly, the Stanford draft convention law. This is the last law under consideration that governs cybercrime as it relates to the interference of computer data. This law stipulates two general conventions relating to illegal access or access without the organization’s or the owner’s consent. The first provision is that an individual is deemed engaged in unlawful engagement if he creates, alters, deletes, transmits, manipulates, or interferes with the data in a cyber-system to cause the cyber-system to cease functioning (Siregar & Sinaga, 2021). The second provision that holds an individual guilty under this law is if an individual alters, deletes, transmits, or manipulates the data in a cyber-system to inflict substantial damage to the person or property.

Who creates policy and enforces these laws

Various international bodies, for instance, the United Nations and the International Telecommunication Union, must create and enforce cybersecurity policies. The United Nations is a body that formulates cybersecurity policies through its Security Council secretariat. The United Nations established the Security Council in 1945, primarily aiming to maintain international peace and security (Delbert, 2018). It does so by investigating any dispute that may lead to international friction and determining the proper ways of fostering international peace and security. Since extensive Internet use has given rise to cybercrime, the Security Council has the legitimate authority to create binding international law (Delbert, 2018). Even though it operates under the U.N., the member states of the United Nations have agreed to execute the decisions reached by the Security Council regarding international peace and security.

The International Telecommunication Union is the other international body that initiates cybersecurity policies. ITU launched the Global Cybersecurity Agenda (GCA) in May 2007, which is focused on proposing strategies for solutions against various forms of cyber threats. The Global Cybersecurity Agenda has five pillars: legal measures, technical and procedural standards, organizational structures, capacity building, and international cooperation (Delbert, 2018). The legal measures pillar focuses on enhancing the citizens’ understanding of cybercrime laws, especially in developing nations. On the other hand, the technical and procedural measures focus on standardization and recommendation of the security standards roadmap. Organization structures outline how CIRT deployment, cooperation, and information work together to enhance a safe workplace environment (Delbert, 2018). Finally, capacity building entails offering technical assistance and conducting cybersecurity seminars to foster comprehension of cybersecurity measures. International cooperation seeks to unite organizations such as ABI Research, Interpo

Order a similar paper

Get the results you need