Cybercrime, Privacy Laws, and Tort Law: Key Concepts for Students

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Cybercrime

Encompass a range of illegal activities targeting computer systems, networks, and data, often exploiting vulnerabilities like weak passwords or unsecured networks.

2
New cards

Hackers

Gain unauthorized access out of curiosity; systems may be held for ransom.

3
New cards

Crackers

Break in to cause damage or commit crimes, like the Marriott data breach.

4
New cards

Hacktivists

Deface sites for political or ideological reasons.

5
New cards

Malware

Includes viruses (disrupt software), worms (target networks), Trojan horses (hidden damaging code), logic/time bombs (triggered by events/dates).

6
New cards

Spyware

Hidden in freeware; tracks credit cards, SIN, or behavior.

7
New cards

Spam

Junk email (90% of internet mail); countered by CAPTCHA (images computers can't read).

8
New cards

Phishing/Spoofing

Fake messages/sites tricking users (e.g., eBay clones); involves botnets (infected PC networks).

9
New cards

Identity theft

Uses stolen info for fraud.

10
New cards

Cybersquatting

Registers similar domains for resale (e.g., Footloose variants).

11
New cards

Cyber harassment/bullying

Spreads threats or obscene content (e.g., Amanda Todd case).

12
New cards

Cyberwar/terrorism

Disrupts national systems for military/political goals; examples include Gulf War hacks and election site attacks.

13
New cards

Security plan

5 steps—risk analysis, policies (backup/disaster recovery), implementation (firewalls/encryption), training, auditing (penetration tests).

14
New cards

Tort

Is a conduct that causes injury to other people. This will result in the other person to sue you for damages and compensation.

15
New cards

Intentional tort

Wrongful conduct that causes damages.

16
New cards

Unintentional tort

Careless conduct that causes damages.

17
New cards

CCD

Conduct that Cause Damages. Someone can sue you if they can prove CCD.

18
New cards

Assault

Threats that cause damages unless consented or informed.

19
New cards

Battery

Intentional and unlawful physical contact with another person unless self defense.

20
New cards

False Imprisonment

Unlawful restraint unless unauthorized.

21
New cards

Trespass

Intentional and unauthorized entry or interference of a person's property unless appropriate consent or accident.

22
New cards

Nuisance

Unreasonable interference with a person's use or enjoyment of their land or property unless no knowledge or reasonable.

23
New cards

Defamation

Wrongful act involving making false statements about someone that harms their reputation unless truthful or privileged.

24
New cards

Absolute privilege

Testify in court or before hearing your testimony is false or untrue. Can be fined by a judge for lying under oath. Cannot be sued for defamation.

25
New cards

Qualified Privilege

Report alleged criminal activity. Reported individuals cannot sue you for reporting alleged.

26
New cards

Fair Comment

Protects opinions on matters of public interest, provided the opinion is based on true facts, is recognizable as comment, is honestly held, and is not made with malice.

27
New cards

Negligence

1 — 4 must be proved for defence: A. A duty of care, B. Breach of duty, C. Causation, D. Damage: Plaintiff must prove.

28
New cards

Privacy

Control over personal information. It is not a natural right, but it is a prudential right (beneficial to all).

29
New cards

Privacy law

Protect individuals from misuse of data, ensure transparency and accountability, and prevent identity theft and discrimination.

30
New cards

PIPEDA

Organizations need to collect personal info about you for their legitimate business purpose. It is federal.

31
New cards

Digital privacy act (DPA)

Improve privacy protections and simplify rules for business. Businesses must report data breaches that pose a serious risk of harm to the privacy commissioner.

32
New cards

Personal Information Protection Act (PIPA)

Applies to private-sector organizations within the province. It is similar to PIPEDA but locally enforced.

33
New cards

Freedom of Information and Protection of Privacy Act (FIPPA)

Applies to public bodies in BC that allows individuals to request access to information e.g., school boards, ministries, universities.