StudentShare solutions
Triangle menu

Leaks and Hacks. When Is It Illegal To Get Hacked - Essay Example

Not dowloaded yet

Extract of sample
Leaks and Hacks. When Is It Illegal To Get Hacked

The term is also used to describe variation of a program or mechanism to give the user entrance to computer features that otherwise would be inaccessible like the DIY circuit bending. Hacking has been considered a serious crime especially when one hacks in to a government. There are instances when some get involved in what is termed as "ethical hacking"; this is company's strategy to determine their security weaknesses or target for intruders. Even so, the ethical hacker may get in trouble with the law, it is therefore necessary that some one gets the Get out of jail Free Card (GOOJFC) which is a document that states that you have been authorized by someone in power to do so. Hacking is a federal crime and any cases of suspicion would be investigated by the federal Bureau of Investigation (FBI) and Department of Justice (DOJ), the crime can never be expunged unlike the other state crimes, depending on the damage caused, one could also be sued for damages ion the civil court leading to possible jail term or job termination. There are some critics who are proposing that any company hacked should be held responsible and make it a rule that it's illegal to be hacked.
Taking Responsibility
In the recent years, the Federal Trade Commission (FTC) has issued claims and charged hefty fine to some companies that had leaked data to hackers. This of course brought about some critical questions about taking responsibility if the firm in question is hacked (Severson.1997, 36). Usually it's very difficult to stop a company's computer system from being hacked if not impossible; hence imposing liability to the affected company could result in unintentional consequences.
The development of disclosure laws has played a great deal in revealing that some of the security breaches that have bee common over the pas t few years were actually due to negligence on the part of the corporate information technology (IT) team failing to lock down the data in any considerable mode. This revelation encouraged the pressure on companies that get hacked to take responsibility for the crime. The computer systems hold very critical information about consumers, company's corporate management, finances and other critical information that should not be accessed by just anybody; companies that leak such information should be help responsible (Hammond & Hammond 2003, 36). This is according to Slashdot post at info world.
Imposing serious penalties on the involved companies especially on claims of negligence is also very risky undertaking on the company and consumers. This is because the regulations may be very strict and could result in unintended consequences bearing in mind that hacking is inevitable, companies may even totally stop accepting credit cards from customer since the liability could be very great (Severson.1997, 42). This means that people would have to forego the convenience of using credit cards to protect their safety. Most of the credit card users however would rather use their credit cards for convenience and risk their safety since benefits outweigh the chances of risk.
Leaks and Hacks
The difference between leaks and hacks is not very distinct as in leaking information facilitates hacking and it's likened to the difference between negligence and wickedness (Hammond & Hammond 2003, 39). This is the basis on which some penalty is imposed on companies with arguments that doing something stupid that hams others should be penalized. This is like the situation when a driver falls asleep at the wheel and because a fatal accident, it's quite justified to hold him accountable for being negligent with other people's life, in the same way a negligent ...Show more

Summary

Hacking basically refers to the breach of computer security. On the other hand, hacking can be used to describe smart or quick fix to computer problems or an awkward and inelegant resolution to a problem, this is according to computer science and technology way of definition…
Author : qhartmann
Leaks and Hacks. When Is It Illegal To Get Hacked essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Leaks and Hacks. When Is It Illegal To Get Hacked"
with a personal 20% discount.
Grab the best paper

Related Essays

Illegal immigrant
They are underpaid and work in squalid conditions just to make a few meager dollars to send back home to their families. Since immigrants are so desperate to come to America for the job opportunities, and because it costs so much to attempt to deport them all, it has become vital to implement measures that might make it easier for these people to obtain their citizenship so that they may have the same job opportunities as the rest of the American citizens.
4 pages (1000 words) Essay
I will upload the Info to who I need to send it to when get to the step
The point of discussion yet remains Whether online relationships posses the quality of good personal relationships? Today maximum people are a part of some or the other social networking sites, making friends beyond culture and boundaries and from all over the world, but do these relationship ever give the satisfaction and comfort that our real life friends provide.
4 pages (1000 words) Essay
Email Leaks investigation
As the Chief Information Technology Administrator for XYZ Company, my senior vice president called me into his office this morning for a confidential meeting. He has been concerned for some time that his emails sent from his office computer have been leaked to unauthorized individuals, both inside and outside of the company.
3 pages (750 words) Essay
Illegal immigration
Poverty is one of the main issues in underdeveloped nations (Muller (a) 312). It is also the main reason that makes people migrate to developed nations. Immigrants from all over the world have been coming to the United States for a long time (Muller 29). Unsecured borders play a vital role in facilitating the entry of illegal immigrants.
3 pages (750 words) Essay
Read below. ( college students struggling in writing when they get in the college. how can we overcome)
Students should be aware and predict that writing standards at college are going to be higher than writing in high school. In most cases, the instructors are asking students to write something better and different in order to meet the standards of college writing.
4 pages (1000 words) Essay
Illegal immigration
In the course of time INS implemented several projects underway that used technology to segregate low and high-risk traffic and streamline the inspection process. INS is testing other technology, including automated vehicle license plate readers to check vehicles against law enforcement lookout databases and a system, which uses fingerprints to verify the identity of individuals in order to reduce passenger-processing time.
2 pages (500 words) Essay
When is it illegal to get hacked
term is also used to describe variation of a program or mechanism to give the user entrance to computer features that otherwise would be inaccessible like the DIY circuit bending. Hacking has been considered a serious crime especially when one hacks in to a government. There
13 pages (3250 words) Essay
Illegal Immigration
There are many dynamics involved but seldom is the viewpoint of the immigrants evaluated. The issue lies squarely within the responsibility of the Federal government because individual states and
4 pages (1000 words) Essay
Introduction the Playstation Network being hacked
Computer crime is more often common with hackers who spend considerable time learning about flaws in computer based systems especially the ones dependent on
1 pages (250 words) Essay
When jobs are illegal, only illegals will have jobs
The author states that it is the government policies regarding the compensation and benefits due to which illegal immigration issue have elevated. The author states that requiring employers to pay equal
1 pages (250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation