What is a cyberstalking? That means using a computer or other form of technology to track other people, their activities and their movements without them allowing you to, in order to make them fear, for sexual pleasure or other illegal inducements.Go to passi & patelfor more.
Production and distribution of illegal pornography
The Internet technologies in particular enable the production and distribution of child and other types of illegal pornography. This activity is mainly owed to the fact that the Internet guarantees anonymity. These activities of production, downloading, sharing, as well as possessing pornographic materials are illegal, and punishable. The distribution is often made through the use of a software for data transmission, as well as communication via an internet software.
The term cyber terrorism applies to all acts that combine forms of terrorism and cyberspace. Cyber terrorism has two important characteristics: 1. They are illegal attacks and threats of attacks on computers, network and information, they are threats on government and humans, in order to achieve certain political or socially objective and 2. Attack the resulting violence against persons or property, in order to cause fear.
Rights of intellectual property
Violation of the rights of intellectual property as a form of computer crime exists when information and computer technology is used as a means. Criminalization of these things, is illegal and punishable.
The criminalization on the digital piracy is especially important as a form of violation of copyright and related rights, a phenomenon that causes huge material losses. The digital piracy is often defined as illegal reproductions of the works which pertinent that belong to someone else, in order to use them for free or to present it as their own intellectual work.
International legal sources
Convention on cybercrime of the Council of Europe
Although previously it did not include attempts to define the tangible norms that regulate the international legal cooperation, however, the Convention after its comprehensiveness flexibility and opportunity for easy incorporation into national legislation was originally applied for countries in Europe, and has become recognizable mechanism for easy communication between States from around the world.
The Convention contains substantive and procedural norms and standards for International Cooperation. The provisions in the area of substantive law apply to illicit access, the decline in the data, the decline in the system, abuse of offices, falsification related to computer fraud, work related to child pornography, work-related injuries and author rights.
Convention on cybercrime is a continuation of the Convention on the protection of personal rights in the automated process of processing of personal data with amendments. There are also: The Additional Protocol authorized the flow of personal data outside of the country where the person lives. Supplementary Protocol to the Convention on cybercrime for protection of racism and xenophobia. The Convention for the protection of children from sexual exploitation and sexual abuse.
Types of cybercriminal:
Misuse of personal data
The prevention of access to the public information system
Violation of the copyrights and related rights
Violation of the right to the distributor
Piracy on a phonogram, displays of pornographic material to a child
Production and distribution of child pornography
Forcing someone to sexual intercourse or other sexual
Creating and using of computer viruses
Preparation and use of false ID cards