Wednesday, August 28, 2019

Business law 1 Essay Example | Topics and Well Written Essays - 750 words - 1

Business law 1 - Essay Example Black hackers could penetrate company websites and steal information that would be fundamental to them. This trend has led companies to hire hackers whose primary function is to counter the work of the black hackers. The skyrocketing use of social media has created a cyber threat. Apart from individuals, businesses are getting into social media which has substantially increased the threat of attack. Companies have taken a step beyond policies and procedures and developed tactics to combat these attacks. File log systems, data leakage prevention and enhanced monitoring of the network are among the advanced technologies developed to curb cyber attacks on companies. Research has advised that large firms should look into developing specialist policing and forensic computer resources for easy detecting and mitigation of cyberspace strikes. Law enforcement agencies are targeting social media sites are they are the easy places to find data. The unwarranted use of social media is giving a rise in cyber harassment, identity theft, and cyber stalking. Users are being tracked, and their data stolen, and illegally used on other platforms. The biggest challenge to social media legislator is mitigating the risks to the users and providing appropriate remedies to the victims. Corporations have come up with the e-signature technology where individuals can sign documents online and deliver them with embedded sign on the owner. It has the same impact legally as the hardcopy signature and enables identification. However, with knowledge asymmetry in the internet usage, ill-intentioned users can hack and impersonate others for selfish reasons. It can also amount to identity theft. Trespass as a cyber tort may include sending spam emails and spyware that if negligently handled, may gather data from one computer and send back to the source of the email. The other emerging trend is the need for the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.