We will be discussing two the Cyber-laws the Personal Data Protection Act 2010 and the Digital Signature Act 1997 and how they apply to this case study. “The Personal Data Protection Act 2010 applies to any person who processes and any person who has control over or authorizes the processing of any personal data in respect of commercial transactions. It also provides protection on the rights of data subject/data users” (Mohamed, D., & Abdul Jalil, J. 2010). “The Digital Signature Act 1997 aims to provide security protection to on-line transactions. It regulates the use of digital signatures and governs certification authorities through issuance of valid licenses. It only legalizes one form of digital signature technology, namely private key-public key Cryptography” (Mohamed, D., & Abdul Jalil, J. 2010).
The VL Bank could implement the two cyber-laws to help enhance the the operations at an enterprise and banking level. Since VL Bank is going through this horrible financial dismay and fraudulent transfers adapting this cyber-laws would help prevent future fraudulent activities, financial embezzlement and customer fraud. We believe that the two standards must be implemented to help mitigate any further violations of fraud and security.
VL Bank has a civic duty not just to its customers but its own reputation as well, regarding industry wide safeguards to and report recent incidents and transactions dealing with unauthorized money transfers and deposits. The Personal Data Protection Act 2010 is supposed to protect the privacy of persons having accounts at the institution. Customer’s data should not be automatically available to individuals or organizations.
The Digital Signature Act 1997 was written in order to help with en...
... middle of paper ...
... frauds and unauthorized access are established and up to date. This will help to regain its position in the financial industry as well and gain the confidence of customers.
References
Douglas, T. and Loader, B. D. (2000). Cybercrime: Security and Surveillance in the Information Age. Routledge. Retrieved from: http://books.google.com/books?id=3Pn6wRQFw9AC&pg=PA162&dq=cybercrime+laws&hl=en&sa=X&ei=o4QoUafUA6en0AX_-4GYBg&ved=0CC8Q6AEwAQ#v=onepage&q=cybercrime%20laws&f=false. Retrieved on: 23- 2- 2013
Mohamed, D., & Abdul Jalil, J. (2010). Violation of cyberlaws and computer ethics: the consequences and potential legal actions.
Woodman, P. (2007). Business continuity management. London: Chartered Management Institute.
Williamson, G. D., & Money–America’s, G. E. (2006). Enhanced authentication in online banking (Doctoral dissertation, Utica College).
Taylor, R. W., Fritsch, E. J., Liederbach, J., & Holt, T. J. (2011). Digital Crime and Digital Terrorism 2nd edition. Upper Saddle River, New Jersey: Prentice Hall.
Jalal Hafidi MIS5206.001– HDFC case analysis 1 1. What, if anything, should HDFC do to make existing customers more secure? First of all, all systems can be compromised no matter what, which means it hasn’t been done yet in the IT field. HDFC is still fairly new in the market, with the technology trend, online banking will be the most challenging and vulnerable part of the game. HDFC seems to have pretty strong security system and procedures, however, its models still haven’t matured yet, leading to maybe inconvenience to the customers and/or an opportunity for hackers to test and dust off their hacking skills.
McQuade, Samuel C. "research on cybercrime." Issues: Understanding Controversy and Society. ABC-CLIO, 2011. Web. 21 Jan. 2011
The finding of this report are based on four different factors for different factor for analysis of personal data protection and personal data privacy. The first is current regulations, which ……
Journal of Internet Banking & Commerce, 18(2), 1-11. Retrieved from http://www.arraydev.com/commerce/jibc/. Sullivan, C. (2009). The 'Standard'. Is identity theft really a theft? International Review of Law, Computers & Technology, 23(1/2), 77-87.
This system helps all of these banks provide financial secrecy which is that only you and your banker would legally be allowed to know the financial activity within your account. The financial secrecy, completely different from financial privacy, includes many regulations to maintain this asset of secrecy. For example, many banks would n...
Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been “an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014” As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the risk of a cyber attack from and individual user to a large scale business.
We have grown accustomed to having the Internet at our fingertips no matter where we go. It is impressive that with less than 10 clicks we could talk, make a transaction or finish a business deal. As with anything, there are always ups and downs. The Internet is extremely useful and without it people and businesses would not be able to function properly; but along with those benefits comes a real danger, and that danger is Cybercrime. Cybercrime put simply is any crime committed on the Internet, whether it is downloading music illegally to cyber-terrorism. In today’s modern era, cyber crime is almost unavoidable, it is essential to prepare yourself and learn as much as you can in order to protect your assets. The Internet is a powerful tool that can be used for good or evil but is up to you to choose.
In today's society, many aspects of crime are committed on a regular basis. Civilians take advantage of people all the time using online resources such as fraudulent websites requiring credit card information to get a free monthly trial. Other examples of cyber crimes include online chat websites, full of predators, or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.
The problem this paper will endeavor to address is that of cyber security or the lack of it, characterized by the cybernation of our lives, which has increased our vulnerability to cyber-attacks. The scope of the threat posed by cyber insecurity will be addressed. How severe is threat posed by cyber criminals? How do they operate? The ramifications of cybercrimes and their impact on the economy are without a doubt cause for government. In addressing the problem, however, the government faces the dilemma of acce...
In the early years of computers and computerized technology, computer engineers had to believe that their contribution to the development of computer technology would produce positive impacts on the people that would use it. During the infancy of computer technology, ethical issues concerning computer technology were almost nonexistent because computers back then were not as multifaceted as they are today. However, ethical issues relating to computer technology and cyber technology is undeniable in today’s society. Computer technology plays a crucial role in all aspects of our daily lives. Different forms of computer technology provide unique functionalities that allow people to perform daily activities effectively and efficiently. In modern society, we use computer and cyber technology to communicate with friends and family via social networking sites, participate in business transactions, and get current news. Different tasks require unique technological feature in computer technology to function properly. Although, unique technological features increase people’s proficiency in accomplishing various tasks, unique technological features in computer and cyber technology increase security vulnerabilities. In many cases, the security vulnerabilities in computer technology are exploited by cybercriminals to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft. Privacy concerns...
As one of the feature of biometric, signature verification is used to find the authenticity of a person to give the access the most valued and important documents and shelf. Firstly the signature of a person are taken as a reference in database. To generate the database, number of attempts from the same person has been taken, as it would permit minute deviations in signatures that generates due to environmental conditions. Once it is done, then the signatures at other times are every time then verified with the existing database. Because of confidentially of the file/document/transaction giving access is the crucial process that should be monitored with perfection. The same happens with offline signature verification. Computerized process and verification algorithm (thus software) takes fully care of signature under test, generate results that are 100% authentic, and advocates credibility of the concerned person .However, there might raise issue of authenticity even if the same person performs the signature. Or, at times a forge person may duplicate the exact signature. Many research have been done to find the accuracy of result so as to prevent from forgery. Forgery is also divided into different categories depending upon their severity as
Novakovic, J. (2012). Responsibility in Application of ICT as Legal, Moral and Ethical Issues. Retrieved from http://ieeexplore.ieee.org.libaccess.hud.ac.uk/stamp/stamp.jsp?tp=&arnumber=6419151
Crimes like the various forms of networking hacking existed before the technology boom, but with computers and other pieces of technology, these crimes became easier to commit and many times get away with. Cybercrime is a concern that has been attracting media attention since 1945, when the United Nations created an international cooperation and collective security network of 192 countries to cooperate and solve international problems and one of a growing issue is cybercrime (Portnoy and Goodman, 2009). Now that technology is developing fast daily, individuals and businesses are more likely to attain this problem. I could see that cybercrime will be the top threat to the United States. Not only our country but also the people of our
Wolf, Ulf. “Cyber-Crime: Law Enforcement Must Keep Pace With Tech-Savvy Criminals.” Digitalcommunities 27 Jan. 2009 .