Pages

Saturday, July 10, 2010

watch out! Cyber crimes could be behind the World cup


Hi friends.
Today,I like to post some thing regarding the World cup fever and some potential crimes could occure in these days. The other days I read some issues in this regard according which IT security company Symantec is expecting a rise in cyber crime during the 2010 Fifa World Cup, saying this will not necessarily take place in South Africa, but that the tournament will be used to lure victims globally.
That's true, because An increase in web bookings for accommodations and tickets for the World Cup in South Africa has spurred local online users to warn about an uptick in cybercrime in the region.

Africa is currently facing an increase in phishing attacks in which criminals try to extract bank account information in order to steal money from unsuspecting bank customers. Meanwhile, South Africa is hosting the World Cup from June to July this year, with millions of people already making online bookings for tickets and accommodations.

"We saw a 60% increase in activities like phishing, web-based attacks and other cyber crime during the 2008 Beijing Olympics and the Fifa World Cup is a considerably larger event,and there will be at least one billion soccer fans actively following the event, which presents an opportunity for cyber-criminals." This is what IT security company Symantec is stating.so better to be carefull.come along and get more information in this respect.
http://www.fin24.com/Business/World-Cup-will-spur-cyber-crime-20100316
http://www.itpro.co.uk/624499/cyber-crime-appears-to-fall-despite-world-cup

Wednesday, June 30, 2010

Defamation and jurnalists' duty


Hi friends , in this post I'd like to have a look at impact of extension of suing against the journalists in light of cyber law and relevant acts just for the excuse of the defamation. it is obvious that defamation must be treated as a crime and bad action which must be controlled and stopped , but on the other hand a little exceed in this regard can lead to awful limitation for journalist s to do their jobs. Threats driven by suing from people side who claim for defamation and lack of certain boundary of act to distinguish between real and true defamation and false is important issue may could cause some problems for professional journalists who must be able and allowed to critic , however in right manner,to communicate many issues in society. This matter can force journalists to keep their head down and avoid to do their job that way they should. Therefore it will be appeared with some contradiction between democracy , freedom of speech and on the other hand maintaining the right of people who are plaintiff . yes it is going to be a little bit complicated issue that should be managed with enough delicacy. In this space we cannot ignore the role of jury who assigned among the people in society and tend to be favour of plaintiffs and may be against the journalists.
It’s my honour to have your idea as well to make this discussion a little acceptable and knowledge based.
for further knowing have a look at:
http://mavrkydefamation.blogspot.com/

Twitter Settles With FTC Over Data Security Lapses


Hi there.today I have another news for you regarding the cyber law area.
If you promise customers that their personal information is secure, you had better deliver on that promise. That is the message of last week’s settlement between the FTC and Twitter — the FTC’s first case against a social networking service. It’s a message the FTC has sent to industry before.

The matter arose when hackers twice secured administrative control of Twitter in early 2009. (How? In one case, an automated password-guessing tool smoked out the administrative password – ”a weak, lowercase, letter-only, common dictionary word,” according to the complaint.) The breach led to a series of phony tweets from a number of user accounts — including one from then President-elect Obama. Hackers also reviewed non-public user information.
read more here:
http://abcnews.go.com/Technology/wireStory?id=11002759

Tuesday, June 29, 2010

Court Dismisses Viacom Copyright Suit Against Google/YouTube


Hi friends. There’s big news in the CyberLaw world these days. The Associated Press is reporting that a federal court in New York has dismissed Viacom’s $1 billion copyright suit against Google and YouTube. I suppose this issue is exactly relevant to our new lecture in which we did learn about respective acts in cyber law, so I hope it can be informative for all of you.read more in:http://www.google.com/hostednews/ap/article/ALeqM5iKT5daxg5dkcEmMsKkLRRcI8JVAgD9GH70SG2
http://abcnews.go.com/Technology/wireStory?id=10994973

Tuesday, June 22, 2010

Freedom of speech in cyberspace


Hi friends. I'd like to carry on the issue of freedom of speech in cyberspace.As you see these days in many countries, speech through cyberspace has proven to be another means of communication which has been regulated by the government.in recent years has been released numerous reports documenting the filtration of internet-speech in various countries. While China has thus far proven to be the most rigorous in its attempts to filter unwanted parts of the internet from its citizens ,many other countries including Singapore, Iran, Saudi Arabia, and Tunisia have engaged in similar practices. In one of the most clear examples of information-control, the Chinese government for a short time transparently forwarded requests to the Google search engine to its own, state-controlled search engines . These examples of filtration bring to light many underlying questions concerning the freedom of speech, namely, does the government have a legitimate role in limiting access to information? And if so, what forms of regulation are acceptable? The recent blocking of "blogspot" and other websites in India failed to reconcile the conflicting interests of speech and expression on the one hand and legitimate government concerns on the other hand.what idea do you have in this respect. I appreciate it if you share your idea with me.

Monday, June 21, 2010

FREEDOM ON THE NET


Hi,my friends. in this post I'm going to share an informative issue with you which is the interesting study about freedom on digital media.As internet and mobile phone use explodes worldwide, governments are adopting new and multiple means for controlling these technologies that go far beyond technical filtering. Freedom on the Net provides a comprehensive look at these emerging tactics, raising concern over trends such as the ‘outsourcing of censorship’ to private companies, the use of surveillance and the manipulation of online conversations by undercover agents. study evaluates the level of internet and mobilephone freedom experienced by average users and activists in a sample of 15 countries across 6 regions: China, India, and Malaysia in Asia; Cuba and Brazil in Latin America; Egypt,Tunisia, and Iran in the Middle East and North Africa; Kenya and South Africa in sub-Saharan Africa; Russia, Estonia, and Georgia in the former Soviet Union; and the United Kingdom and Turkey in Europe.
Writer says Covering the calendar years 2007 and 2008, the index addresses a range of factors that might affect such freedom, including the state of telecommunications infrastructure, government restrictions on access to technology, the regulatory framework for service providers, censorship and content control, the legal environment, surveillance, and extralegal attacks on users or content producers. The selected indicators capture not only the actions of governments but also the vigor, diversity, and activism of the new media domain in each country, regardless of—or despite—state efforts to restrict usage.
read more in:
http://www.freedomhouse.org/uploads/specialreports/NetFreedom2009/FreedomOnTheNet_FullReport.pdf

Wednesday, June 16, 2010

Iran blocks wordpress!!!


Hi there. I'm glad having new post today. but I'm really regret about the news I heard the other days.the news was that Iranian government blocked wordpress so that prevent bloggers to air country's ordinary information like video and pictures on internet. Iran officials blieve public does not have right to exchange issues happening inside the country and indeed they try to limit flow of information to stop democracy comes true.Infact this issue resulting from government with respect to some riots rose last year in relation to presidency election.as we see there is not enough freedom atmosphere in Iran and people are incurred lots of trouble to communicat with each other in light of internet facilities.this situation has driven bloggers switch to other web facilities .
get further information in:http://mashable.com/2009/05/23/iran-blocks-facebook
http://www.boingboing.net/2007/08/20/turkey-blocks-wordpr.html

Sunday, June 13, 2010

A real case regarding cyberlaw around us


Hi there. Today I have something I like to share with you. I'd be pleased if you can share your ideas in this regard. The issue is that the other days one friends of mine posed a matter has happend to him and he liked to get my opinion in that respect and since I suppose two heads is better than the one, therefore I decided to get your point of view too. May we can find the best way for it and may we can get good exprience in light of that. The matter is that someone stranger has put a very insulting comment in my friend's face book page and used very vulgar words toward his family (mother and sister) and threatening him to revenge for uncertain things. Since he or she is unknown so it put very big question mark for my friend if who is that and what is the purpose of that rudely action . My friend wish to find that person and take some action against him or her . Having severly got angry he started to retaliate the same and he also took some bad word against him because he suspected of someone in their next doors and some evidence indicate his guess is true. But when he talked me I pointed out that the better choise to handling this problem is retaliation but also he must reffere this matter to police and make complaint against that person . Also I suggested to him so that collect and save all respective information in a file and deliver them the police to be pursuable.
since this issue is regarding the cyberlaw so I like to have your idea and suggestion . May this real case be interesting for you to match with your fresh knowledge regarding to our lessone "cyberlaw" , I hope so.please put comment.

Thursday, June 10, 2010

Experienced Lawyers Handling Copyright Infringement, Media Law, Defamation and Free Speech

Experienced Lawyers Handling Copyright Infringement, Media Law, Defamation and Free Speech

Copyright Termination of Transfer


Hi My friends.I read a interesting article about recent changes in copyright in U.S that can be useful for you to know it. so I'd like to share it with you. I hope we can brush up our knowledge about many topics around cyberlaw which in light of this knowledge may we be able to avoid some troubles and handle our business at the best. I hope so.
Copyright Law has changed in both scope and length of copyright provisions. It originally was 14 years with a possibilities of a renewal of 14 years. It changed to be 28 years for initial term and then another 28 year renewal term. Congress then added 19 years and then another 20, eventually creating a system of dual term copyrights. Today we have a unitary term system based for most works on the life of the author plus 70 years. That dual term system is actually related to one of the types of termination rights that are currently in the Copyright Act. Damien Allen and Lydia Loren discuss the challenges and the provisions of Copyright Transfer Terminations on today's program.
•The Copyright Act gives authors and their families certain rights to terminate agreements
•Section 203 Termination Rights of the Copyright Act, in Title 17 of the United States Code are for agreements entered into after the 1976 Copyright Act, effective January 1, 1978. For 203 terminations, you can terminate an agreement entered into by an author 35 years after the date of the agreement.
•Section 304 terminations relate to the lengthening of copyright terms of agreements that were entered into before the effective date of the 1976 Act.
http://tcattorney.typepad.com/digital_millennium_copyri/2010/03/copyright_termination_of_transfer.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+DigitalMillenniumCopyrightAct+%28Digital+Millennium+Copyright+Act+Alerts%29

Wednesday, June 2, 2010

cyber right in china


Hi there. we had today lecture about aspects of cyber right across the world. I like to have look china's reaction about this subject. reviewing press news I ran into a topic concerning cyber right in china.As most of us heard recently China's government began to harden control over the get out transmitting information about states.That goes in so far as to define every thing as a secret information , including, maps, GPS coordinates, even economic statistics - could fall under the category, and officials sometimes use the classification as a way to avoid disclosing information.

In the century that many countries widely talk about global village and explosion information century hearing that news from China as a fast growing economy which must play based on global rules, can surprise us!However according to the idealogy and rulling policy each country tend to come out specifice define of freedom in cyber right and in general human right which can directly impact on degree of freedom can be exposed in internet communication and approaching to global thinking and living.
read more in:http://www.cbsnews.com/stories/2010/04/27/tech/main6435422.shtml

Tuesday, June 1, 2010

Domain Name Owner Wins His Expenses In Cybersquatting Case


Hi friends . would you like to hear and learn about a cybersquatting case which happend in US? if so, I have it for you right down here. so come along and get news.
A domain name owner last year won his expenses in a cybersquatting case in federal court. Domain Name Wire reports that Neon Network has been awarded its expenses after it won a default judgment in a declaratory judgment action under the Anticybersquatting Consumer Protection Act in Arizona. Aspis Liv Forsakrings, an insurance company, originally filed a cybersquatting case under the Uniform Domain Name Dispute Resolution Policy against Neon Network with the World Intellectual Property Organization. WIPO found that Neon had registered the domain name in bad faith, and the aspis.com domain name was transferred to Aspis.

Neon Network then filed a declaratory judgment action in Arizona asking the court to determine that it had not violated the Anticybersquatting Consumer Protection Act. The judge issued a default judgment against Aspis and awarded Neon $1,547. The judgment can be viewed here, courtesy of Domain Name Wire.
read more in:http://wipo.int/amc/en/domains/decisions/html/2008/d2008-0387.html

Tuesday, May 25, 2010

Defamation Law

domain name a big furtune for cybersquatters!!!


Hi friends.I hope you have enjoyed so far my weblog. I am trying post regularly some new and interesting things so that that's going to be useful for us.I hope so.today's topic is also interesting. have you ever had a lot of effort to make a business? whether or not you know it's inescapable fact that many businessmen really make lots of effort to make their product and service well known and famous.I think you agree with me that well known name can be main part of branding.now suppose a business having tried a lot in market and have acheived good positionig in consumer's mind , is going to develop a website under its name to extend its communication with customers. though somtimes there is a big problem. someone has taken that website name under his or her own. if you like use that website name which is named after your business name, you have to pay lots of money to that person to buy it. it's really unfurtunate case for you. this kind of actions is called as cybersquatting and the opportunitist person who wanna extort you in a way is called cybersquatter. nowadays there are too many of like these cases that make problem for people. you can read more about it if interested, in the following address:
http://cybersquattingcases.com/

Sunday, May 16, 2010

What Is Cyberstalking?


Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim's immediate family; and still others require only that the alleged stalker's course of conduct constitute an implied threat. While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously.
What To Do If You Are Being Cyberstalked

If you are receiving unwanted contact, make clear to that person that you would like him or her not to contact you again.
Save all communications for evidence. Do not edit or alter them in any way. Also, keep a record of your contacts with Internet system administrators or law enforcement officials.
You may want to consider blocking or filtering messages from the harasser. Many e-mail programs such as Eudora and Microsoft Outlook have a filter feature, and software can be easily obtained that will automatically delete e-mails from a particular e-mail address or that contain offensive words.
read more in:
http://www.cyberguards.com/CyberStalking.html
http://blogs.pitch.com/plog/2009/07/cougar_de-clawed_judge_orders_johnson_county_woman_to_pay_millions_for_sexually_victimizing_man.php

Wednesday, May 12, 2010

Identity theft- A research review


Hi there. I'm glad I have a chance to communicate with you via this weblog. Today I'like to share some information regarding Identity Theft which I found it useful for us. knowing this sort of things can be useful because apart from our course study we'll need it with respet to our lives and every things are going around us to be protected against some harmful actions. some people are scared to use internet facilities for doing their daily affairs and they avoid to get close that kind of facilities, however others are really dependent to internet function to get their business or tasks done. anyway there are some risk in this regard which can not be ignored. offcours government have taken some action needed in respect to legislation and preventional measures, but may be we have to be more careful against some threats come from bad people. I have a useful topic following I suppose you will like it.to read it go to:
http://www.ojp.usdoj.gov/nij/publications/id-theft/welcome.htm

Friday, May 7, 2010

Era of cyber war


Hi freiends.wow!!,it looks like Hollywood movies.I remember, I used to like movies whose stories were about electronic war, when I was a child and now after years it comes true.reading a news about The NATO Cyber War Agreement,we can see time for cyber war is going on and every thing's going to be cyber-based.the issue I read is dealing with that two years ago, NATO established a Cyber Defense Center in Estonia. This, and the recent agreement, is a result of being called on by Estonia, three years ago, to declare Cyber War on Russia. That was because Russia was accused of causing great financial harm to Estonia via Cyber War attacks, and Estonia wanted this sort of thing declared terrorism, and dealt with. NATO agreed to discuss the issue, but never took any action against Russia.to find more look at:http://www.strategypage.com/htmw/htiw/articles/20100501.aspx

Thursday, May 6, 2010

Click-Wrap


Hi there. today I'd like deal with Click-Wrap.Have you ever faced with a web site that you had to click on "I agree" to download or having transaction? This is a click-wrap agreement, made at or before the time of purchase on a web site. The purchaser is required to click “I agree” before the transaction will continue, the installation will proceed or the user will gain access to the web site.There are issues about how to treat terms that are not proposed or discloseduntil after the user has already agreed to go forward with the transaction and has tendered the required consideration. Find more in if you are interested in:
http://www.murdoch.edu.au/elaw/issues/v9n3/kunkel93_text.html#Shrinkwrap%20License%20Cases_T

Tuesday, April 27, 2010

what is the phishing?


Hi friends.
are you familiar with phishing? ya may be every one is familiar with fishing but I don't mean fishing,haha..., todays this phrase has been prevailed in cyber space. there are some people seek to illigally grab money of others. here we can know some things about this issue, so understand about it let me in the following show you a video related to the phishing.
http://www.youtube.com/watch?v=QlUR7DND2fo&NR=1

Monday, April 26, 2010

How can people be affected by cyberbullying ?

Hi friends.today I was concerned reading news about the suicides of some teenagers. I'd like to share that news with you, I hope it will be useful for you too.
Hearing trrifying news recently about cyberbullying and its effects on the societies, I am asking myself wow! how human beings' beauties and nasties can be reflected in the cyber world.Yes it is going around these days and cyber space is the two edges sword that can be sometimes useful and sometimes harmful depending on who use it.The suicides of 13-year-old Ryan Patrick Halligan, 15-year-old Phoebe Prince and 13-year-old Megan Meier, only due to cyberbullying, has made a big question mark for people that what should we do against these new crimes.
In this technological age of cell phones, instant messaging and social networking sites like Facebook and Twitter you don’t have to face your victim to insult, demean or terrorize them. You just have to show a picture of them looking stupid, make some vicious comments about their sexuality and their looks, repeat it over and over until everybody sees it, and you’re a cyberbully.read more in...

http://registerstar.com/articles/2010/04/22/news/doc4bcfb7efdd999702339225.txt

Tuesday, April 20, 2010

EU privacy watchdog calls for built-in data deletion

Hi there.
wow, it seems with this new officials' decision ,somehow privacy of computer users can be protected.
European law should require digital equipment makers to build in an easy, free way to delete all personal data, according to Peter Hustinx, the European data protection supervisor.
http://www.computerweekly.com/Articles/2010/04/19/240954/eu-privacy-watchdog-calls-for-built-in-data-deletion.htm

Saturday, April 17, 2010

north korea cyberarmy on Flickr - Photo Sharing!


north korea cyberarmy on Flickr - Photo Sharing!

Cyber Crime Annual Report 2009 released by IC3

Hi friends
have you ever though of amount of cyber crime every year? yes it could be interesting given this so much using of online trade and other functions nowadays. so join me to get some thing new.
The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), released the 2009 Annual Report about fraudulent activity on the Internet on 12 March 2010.
Online crime complaints increased substantially once again last year, according to the report. The IC3 received a total of 336,655 complaints, a [...]to read more go:
http://www.ic3.gov/media/annualreport/2009_IC3Report.pdf

Wednesday, April 14, 2010

Pro CD v Zeidenberg

Hi there.
today I'm gonna look at a cyber law case. do you konw what is click wrapping? ok,I think we can learn some thing new about it today.let's take a look at it.
Pro CD sells computer program that lists phone directories for the US; they have two separate versions (and price structures) for commercial and personal users.Pro CD's personal use program includes contract terms on the inside of the shrinkwrapped package limiting the user to noncommercial use.Zeidenberg purchases the personal use program, uses it to create a commercial website listing phone directories at a lower price than Pro CD.Pro CD files suit seeking injunction, citing license inside shrinkwrapped package...

See generally offer
http://home.uchicago.edu/~jmellis/ProCD%20v%20Zeidenberg.html
http://www.wilmerhale.com/publications/whPubsDetail.aspx?publication=2031

Sunday, April 11, 2010

Indexing company liable for users' infringement, says High Court

UK - Indexing company liable for users' infringement, says High Court
(OUT-LAW News)

A company which indexes and sorts postings to Usenet groups is liable for the copyright infringement of its users when they download films, software and television programmes, the High Court has said. Newzbin is a company that charged users 30p per week for access to its indexing and collation of media files posted to discussion groups on the Usenet system.
Labels: Copyright trademarks and patents, Liability jurisdiction applicable law

Wednesday, April 7, 2010

let's generate MBA students assembly

I'd like to inform that I'm going to establish a groupe consist of MBA student studying MBA in MMU.you're welcome to join us .please don't hesitate to connect me for any inquiry made.

Wednesday, March 31, 2010

having a blog

today is the second day that I created my blog.I hereby invite my friends to see my blog and help me to enhance it.

Tuesday, March 30, 2010

Hello, welcome to my blog.
Yesterday is history, tomorrow is mystery and today is gift.