Here is the synopsis of our sample research paper on Regulation and the Internet. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
Regulating the internet is a problematic area. This 10 page paper considers some of the areas where the difficulty may be faced, how the difficulties occur and have seen partially resolution within the law. The paper looks at accessing information on the internet, the use of information on the internet, freedom of speech and copyright issues. Law quoted is mostly UK law but the application of the principles is international. The bibliography cites 14 sources.
Page Count:
10 pages (~225 words per page)
File: TS14_TEintreg.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
a problematic area. One motivation for regulation is the way in which crime takes place on the internet and the line between freedom of information and speech and the
rights f the individual. A traditional stance is that these rights should take prescient until they start to harm others. If we look at the way content may be privileged
and not designed for free viewing there are many web sites that have password protection and other security devices. In most countries there is legislation to protect against this, in
the UK this is The Computer Misuse Act 1990. The act covers three main areas; unauthorised access to computer material, access with intent to commit or facilitate commission of further
offences and finally unauthorised modification of computer material. Accessing information in the Internet Unauthorised access to computer material will include trespass. This is
a difficult are of law as there are many variations of this. The main aim may have been to catch hackers and create a statue that would mean simply accessing
information would be a crime, even if it were not altered or used. When the statute was written to full impact and potential of hacking was not realised (Chandler, 1996).
There are many cases of hacking that have been prosecuted, but there are also a range of cases that indicate the extent and limit of this first category under
the Computer Misuse Act 1990. One area that has become increasing important is the way in which data is seen by those inside and not outside a company, Whilst it
may be difficult to detect an unauthorised entry into a site, it is clear that there is a breach, the less clear aspect is the way in which an
...