Lakiesha M. Brown
August 27, 2014
Business Law I
Phase 3 Individual Project
(This assignment is reused. It has also been submitted XXXXXX course #XXXXXXX, XXXXX instructor Karen Stebbins)
Research, XXXXXXXX, and XXXXXXX at XXXXX 2 emerging XXXXXX or legal XXXXXX XXXXXXXXX XXXXX XXX. XXXXXXXX XXXXX include XXX are XXX XXXXXXX to XXX following XXXXXX:
Cyber XXX
XXXX particular type of XXX is set in place XX protect XXXXXXXXXXX using the internet from criminal activity XXXX takes XXXXX over the internet. XXX XXXXXXX, a XXXXXX XXXXX XXXX XXXX XXXXXXX else’s XXXXX XXXXXXX and steal personal XXXXXXXXXXX that XXXXX allow them XX XXXXX a XXXXXXX of ruining XXXX XXXXXXXXXX’s XXXX. A XXXXXX XXXXX gain XXXXXX of another’s bank XXX credit XXXX accounts and XXXX XXXXXXXXXX purchases in that XXXXXX’s name. XXXXXXX could XXXX horrible death XXXXXXX to an XXXXXXXXXX’s email account or cyber XXXXX and harass an individual all XXXX XXX internet. Without the XXXX set in XXXXX against these XXXXXX XXX XXXXX XXXXX XX a XXXX more XXXXXXXXXXX XXXXX. No one XXXXX dare use XXX internet at XXX. The increase in XXXXXXXX XXXXXXX has led to a higher XXXXXXXXXX of legal XXXXXX worldwide. XXXXXXX cyber laws vary by jurisdiction and XXXXXXX, enforcement is challenging, XXX restitution ranges XXXX fines XX XXXXXXXXXXXX.
XXXXX Stalking
When XXXXXXX XXXX the internet to harass XXXXXXX person by destroying their reputation through XXXXXXXX social networking page, XXX use of threatening XXXXXX, or XXXXXXX online XXXXXXXX XXXX is XXXXXXXX XX as cyber stalking. XXXXX XXXXXXXX is a XXXXXXXX offense and XXXXXX not XX XXXXX lightly because it is XXX a XXXXXXXXXX XXXXX. XXXXX stalking is a XXX to terrorize, XXXXXXXXX, XXX control a person, but XXX XXXXX so face to XXXX. If a XXXXXX XX found XXXXXX XX XXXXX XXXXXXXX he/ she could XX placed XX XXXXXXXXX, receive a restraining order, criminal penalties which may XXXXXXX jail time.
XXXXXXXX XXXXX
Identity XXXXX occurs when someone XXXXXXXXXX obtains and XXXX another’s XXXXXXXX for XXXXXXXX economic XXXX. The XXXXXX XX XXXXXXX XXXX XXXXXXX has XXXXXXXXX XXXXXXXXX of their XXXXXXXX XXXX XXX XX using that XXXXXXXXXXX to commit fraud XXX deception, incriminating XXXX XXXXXXXXXX XXX ruining their lives XXX XX XXX XXXX time. In situations like this your bank XXXXXXXX, XXXXXX card XXXXXXXX, credit score, etc. are XXX in jeopardy of XXXXX XXX through XXX ruined XX an unknown party.
Research, XXXXXXXX, XXX XXXXXXXXX a XXXXXXXX legal case XXXXXXXXX a XXXXX-law issue. XXX summary XXXXXX XXXXXXX a XXXX description XX XXX facts XX the XXXX XXX the XXXXXXX (XXXXX’s ruling) of XXX XXXX.
XXX XXXXX case I researched XXXXXXXX a XX-year-old XXXX who XXX XXXXX, XXXXXXX XXXXXX, XXX XXX charged with XXXXX XXXXXXXX XXX Computer XXXXXXXX First XXXXXX. XXX incident XXXX XXXXX on XXXXX XX, 2014. XXX XXXXX girl’s XXXX was XXX released in XXX media XXXXXXXXXX, XXX XXX was XXXXXXXXX to six XXXXXX XX XXXXXXXXX XXX XX hours of XXXXXXXXX service, along with XXXXXXXXX XXXXX XXXXXXXXXXX of all computer usage. The XXXXXXXX involved another 11-XXXX-old girl who assisted the XXXXXXXXX in XXXXXXXX XXX of their XXXXXXXXX's XXXXXXXX account XXXX explicit XXXXXX and XXXXXXXXXXXXX for sex. They were trying to damage XXX XXXXX lady’s reputation in XXXXXX XX XXXXXXXXXX her XXXXXXXXX XXXX these photos XXX XXXXXXXXXXXXX online. XX XXX XXXX reported that two XXXXX girls XXXX XXXXXXXX XXX XXXXXXX in XXXXX XXXXX’ accounts offering XXXXXX favors, XXX it was all XXXX XX appear XX XXXXXX the XXXXXXXXX XXX sent out these messages. They knew XXX XXXXXXXXX’s XXXXX information because XXXX XXXX once friends and XXX allowed XXX of XXXX to XXXXX to her XXXXXXXX XXXXXXX previous XX XXXX incident XXXXXXXXX. They XXXX XXXX information as a means XX revenge XXXX XXX three had a XXXXXXX out XXX decided they would XX longer befriend one another.
XXXXXXX XXXX opinion XX XXX XXXXXXX of XXX case. Do you agree with the court’s ruling, or XX you XXXX XXXX a different XXXXXXX XXXXX XXXX XXXX XXXX XXXXXXXXX? XXX or XXX not?
I think XXXX XXXXXXX the XXXXXXXXX was very XXXXX XXXX XXXXX her XXXXXXXX XXX set to reflect XXXX. She should XXXXX have been allowed XX XXX the internet at so XXXXX an age without parental XXXXXXXXXXX in the XXXXX XXXXX, XXX XXXX XX a common issue in XXXX homes XXX over the X.S. I agree XXXX her sentencing. I feel XXX XXXXX XXX XXXX in XXXXXXX her XX probation XXX XXXX XXXXX, XXXXXXX, I agree that some XXXXXXXXXX measures XXXXXX have XXXX XXXXX XX XXXX. A letter XXX written to the judge, by the XXXXXXXXX’s XXXXXX, XXXXXX XXXX all internet XXXXXXXXXX XX taken XXXXXX the XXXXXXXXX XXXX. The judge disagreed and XXXXXXX her XX XXX the XXXXXXXX XXXXX XXXXXXXXXXX only.
Personally, I don’t XXXXX XXX XXXXXXXX XX XXX XXX XXXXXXXX XXXXX XXXXX XXXXXXXX XXX abusing that privilege in the XXXXX place. I XXXX don’t XXXX XXXX a XXXXXX could really XXXXX XXXX their mistake when there XX leniency in XXXXX XXXXX XXXXXXX what XXXXXX the problem in the XXXXX XXXXX. XXX’s XXXXX and she doesn’t XXXXXXXXXX that XXXXXX electronics in her XXXXXXXXXX, XX use whenever XXX feels the XXXX or want to XX a XXXXXXXXX XXXX some children her age XX not XXXX. She XXXXXX be XXXXXX XX appreciate this privilege XXX XXX abuse it XX using it to hurt others; no matter the reason.
XXXXXXXXXX
XXXX://XX.XXXXXXXXX.XXX/XXXX/Cyberstalking
http://XXX.techopedia.XXX/XXXXXXXXXX/25600/cyberlaw
X. XXXXXXXX, XXXXXXXX: XXX Law XX XXX Internet, XXXXXXXX Verlag. (1996)
12-Year-Old Sentenced for Cyber XXXXXXXX Classmate, RIPARBELLI, Laura, (XXXX 2011)