LawCyber Law

Crimes in the field of computer information are disclosed by the special department of the Ministry of Internal Affairs of Russia

Recently, with the development of an information network through which corporations and public services send important data to each other, it has become necessary to implement measures to protect personal information. Another even more significant problem was money fraud in the network and other crimes in the field of computer information.

A couple of years ago there was an opinion that it is impossible to track fraudsters operating on the Internet. It is also impossible to protect a virtual purse from being compromised and an electronic signature from a counterfeit.

But information technologies do not stand still, and law enforcement bodies do not slumber.

It turned out that crimes in the field of computer information can be stopped by following simple security measures (which, unfortunately, no one adheres to). If you are talking about a virtual wallet, you should follow the recommendations of the program's developers. If it's an e-mail - never open unknown links, notify the site administration about spam and do not enter your identification data (login and password) on a familiar site whose address is not true (even if it differs from the real one by one letter only). Consumer rights realized through the network also need to be protected. The fact is that the Internet is full of low-quality goods and services. Beautiful slogans, spam messages and colorful banners attract buyers in one way or another. Although on the same shopping sites you can find an unflattering feedback about the product, such prudence will save you from buying non-existent things (and if there are existing glasses, for example, with a video camera or pen with a built-in voice recorder, then it is inaccessible to the public). As for copyrights - here it is more difficult. Protecting them on the network is almost impossible, but you can try. For example, store hand-written sketches. Send to a friend by e-mail your "manuscript" with such text, from which it would be clear that this manuscript belongs to you. Even better, before you put something on the Internet, register your intellectual property in the manner prescribed in the copyright law.

Sometimes simple security measures are not enough to shield themselves from a crime in the field of information technology. They are becoming more sophisticated and no longer look like an inoffensive joke in the form of a "death screen" or "trojan." These include actions that cause users significant harm: breaking passwords from a bank card, spreading slanderous information, distorting important information or deleting them. A good ground for scammers is creating online opportunities for playing in the stock market, auctions. Not to mention the dissemination of information containing pornographic materials and encouraging racial struggle, discrimination.

To protect Russian citizens from such criminal acts, the government had to make further amendments to the law. And today, among other known and qualified crimes, the Criminal Code contains the concept of "crimes in the field of computer information." Recognized as guilty, punishable by the degree of damage caused - from a fine to imprisonment (up to 7 years). It is interesting, but was someone arrested for violating this article of the Criminal Code (28 chapters, articles: 272-274)?

Recently (in 1998) a special department was created in the Ministry of Internal Affairs of Russia - Office "K". It employs IT specialists who not only record illegal actions, investigate crimes in the field of computer information, but also identify the perpetrators. As they succeed, it is better to keep this information secret, so that law enforcement agencies have the opportunity to be one step ahead of the intruders.

It is much more important to know the following. Every citizen can apply directly to the M Office of the Ministry of Interior directly or through the official website. There you can also download a very useful memo about elementary security rules concerning not only the Internet, but also the use of a phone, a bank card.

Disclosure of the crime in the field of computer information is not an easy task: according to the results of the 2010 survey, hackers managed to appropriate $ 7 billion (worldwide). The study was conducted by experts of the largest companies specializing in security breaches in the network - Eset, Leta, Group-IB. Experts of the Office "K" call to report on detected violations in the field of IT, otherwise intruders will go unpunished.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.