The Pros And Cons Of Internet Privacy

1309 Words6 Pages
Now, the Internet is not only a way people access information, but also the net that connects them. People use it to communicate with friends and family, keep current events and shop online. The using of Internet sometimes involves personal data, triggers fraud and abuse. These are the reason people have laws to protect themselves. People now much more cherish their privacy, so the government takes the responsibility of establishing the Internet privacy law and develop them. However, the legislative constitution in United States still faced criticism that need to father revise and develop. In the mid-1980s law enforcement agencies of US confronted the beginning of the PC(personal computer) age with developing worry about the absence of…show more content…
Computers were influenced by many locales, including colleges, military destinations, and therapeutic research offices. The evaluated cost of managing the worm was from $200 to more than $53,000. In the end, Morris was convicted of violating the Computer Fraud and Abuse Act, and condemned three years in jail, 400 hours of community service, and a fine of 10,050. Now some researchers like Tim Wu, a professor at Columbia Law School, still hold a critical view of the Computer Fraud and Abuse Act. They claim that the definition of unauthorized access to the Internet is not so clear. For the Morris worm, the second U.S. Circuit Court of Appeals upheld the conviction as an unauthorized access because he did not utilize the email website in its normal way.“ in any way related to their intended function. He did not send or read mail nor discover information about other users; instead, he found holes in both programs that permitted him a special and unauthorized access route into other computers,” Judge Jon Newman wrote in the decision. This actually gave over a narrow definition of unauthorized access: Using programming for the function expected by its designer is legitimate, as indicated by the Morris administering, however discovering vulnerabilities in that product and misusing them to accomplish something different isn't. It brings up an issue vital to the CFAA: Do we truly need to
Open Document