Tuesday, September 10, 2019

Cyberbulling Assignment Example | Topics and Well Written Essays - 500 words

Cyberbulling - Assignment Example Cyber bullying takes place by use of electronic technology such as computers, cell phones and tablets. Likewise, cyber bullying takes place by use of communication devices including social network sites, chat, text messages and websites. In recent days, United States, have attempted to pass legislation curbing against cyber bullying.. Various states have put in place legislations and implemented Federal laws since 1985 to protect against various cybercrimes including. Under Sec.113. Federal "Cyber bullying Prevention ": To strengthen bullying prosecution devices, this section likewise amends the Communications Act of 1934 to give a clear definition of a telecommunications tool(47 U.S.C 223)(h)(1) to include all device that uses Internet technologies like the voice over various internet services. The amendments in1996 provide. The Communications FEDERAL Act, prohibits the making of phone calls of the use of telecommunication tools "without disclosing the identity of one to abuse, annoy, harass or threaten any individual at the called phone number or an individual receiving the communications. This law helped in defining various cybercrimes previously unknown. In the criminal law, the 2011 federal cyber-stalking law has in many ways helped addressed the previously lacking in previously lacking. The law includes language permitted prosecutors to go after individuals using electronic devices to harass. These laws explicitly stipulate that an â€Å"interactive computer service† may not be used to threaten. In this regard, close to half of the states in the U.S. have likewise implemented their laws to permitted authorities to press charges against individuals engaging in cyber harassment and cyber stalking. The significant difference between the two pieces of legislation is on applicability. The initial law was more general and failed to address the dynamic threats that modern day cyber

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.