Sunday, May 2, 2010
DEAR ALL MEMBERS::::
This site is not used anymore.Please connect to the new blog with the address shervin-honarjoo.blog.co.uk
Saturday, May 1, 2010
Wednesday, April 28, 2010
ISP????

Definition :
An ISP (Internet Service Provider) is a company that collects a monthly or yearly fee in exchange for providing the subscriber with Internet access.
An ISP might provide dial-up service, cable, DSL, or other types of Internet access. Some ISPs are local while others are national. A national ISP will provide access throughout most of the nation, while a local ISP will only serve subscribers in a limited geographical region.
more about ISP...
Saturday, April 17, 2010
Electronic Money:(USA)
E-Money laws (electronic cash, electronic currency, digital money, digital cash and digital currency) resources and Bill Presentments.
Definition of cyber crime law:(USA)
The Federal government, as well as many individual states, have recently enacted laws that generally prohibits:
(1) the intentional and unauthorized access, or the causing of access, to a computer, to acquire, alter, damage, delete, or destroy property or otherwise use the service of a computer program;
(2) inserting, attaching, or knowingly creating the opportunity for an unknowing and unwanted insertion or attachment of a set of instructions or a computer program into a computer;
(3) intentionally accessing, or causing access, to a computer to devise or execute a scheme or artifice with intent to defraud or to obtain money, property, or a service by a false or fraudulent pretense, representation, or promise;
(4) utilizing a computer to commit any crime.
While each state may have its own specific laws, the states have usually based their laws upon traditional federal laws that enable the investigation and prosecution of common "electronic" crimes such as threats, 18 USC 844(e) and 18 USC 875; child pornography, 18 USC 2252; counterfeiting, 18 USC 470-514; and fraud, 18 USC 1341, 1343, and 1344. Specifically, The federal Computer Fraud and Abuse Act, 18 USC 1030, prohibits unauthorized use of computers to commit seven different crimes:
(1) espionage;
(2) accessing unauthorized information;
(3) accessing a nonpublic government computer;
(4) fraud by computer;
(5) damage to computer;
(6) trafficking in passwords;
(7) extortionate threats to damage a computer. 18 USC 1030(a)(l)-(7).
In addition to these commerce based laws, the federal government and a vast majority of the States have enacted laws that cover the use of the Internet to commit communication related offenses such as: obscenity, solicitation of minors and child pornography, sales of controlled substances, fraud, and other crimes.
(1) the intentional and unauthorized access, or the causing of access, to a computer, to acquire, alter, damage, delete, or destroy property or otherwise use the service of a computer program;
(2) inserting, attaching, or knowingly creating the opportunity for an unknowing and unwanted insertion or attachment of a set of instructions or a computer program into a computer;
(3) intentionally accessing, or causing access, to a computer to devise or execute a scheme or artifice with intent to defraud or to obtain money, property, or a service by a false or fraudulent pretense, representation, or promise;
(4) utilizing a computer to commit any crime.
While each state may have its own specific laws, the states have usually based their laws upon traditional federal laws that enable the investigation and prosecution of common "electronic" crimes such as threats, 18 USC 844(e) and 18 USC 875; child pornography, 18 USC 2252; counterfeiting, 18 USC 470-514; and fraud, 18 USC 1341, 1343, and 1344. Specifically, The federal Computer Fraud and Abuse Act, 18 USC 1030, prohibits unauthorized use of computers to commit seven different crimes:
(1) espionage;
(2) accessing unauthorized information;
(3) accessing a nonpublic government computer;
(4) fraud by computer;
(5) damage to computer;
(6) trafficking in passwords;
(7) extortionate threats to damage a computer. 18 USC 1030(a)(l)-(7).
In addition to these commerce based laws, the federal government and a vast majority of the States have enacted laws that cover the use of the Internet to commit communication related offenses such as: obscenity, solicitation of minors and child pornography, sales of controlled substances, fraud, and other crimes.
What is Cybersquatting?
Cybersquatting is a word that has become well known in the e-commerce world. This term refers to the act of registering an internet domain name that incorporates a trademark or a trade name of another person or company for the purpose of holding the domain named hostage and selling it back to the rightful owner. Very recently three separate organizations have been specifically created to resolve domain name disputes. Additionally, the U.S. government has enacted a specific federal statute to address the issue of Cybersquatting. If you feel someone has "squatted" on your domain name, or if you are admittedly are walking on thin ice with your own domain name, CyberlawUSA.com's resources can address your concerns
Computer Contracts:(USA)
Computer Contracts (Acquisitions, Clauses , Distribution, License Agreements, Outsourcing, Software Development, Web Wrap)
What is e-commerce?(usa)
Electronic commerce, more commonly known as E-commerce is basically the processing of any kind of money transaction, such as buying and selling of products or services, through the Internet or some other form of electronic communication. E-commerce often refers to transactions occurring via the Internet or cell phone or any other wireless device and would include such things as credit card purchases, transfer of money and application for credit. The most common categories are business-to-business (B2B) and business to consumer (B2C) transactions. The growth of E-commerce raises a multitude of legal issues for people and companies using the Internet including secure transactions, privacy issues consumer protection and many other related issues.
E-commerce is becoming more and more prevalent and is no longer just the domain of large companies or "tech" companies. Individuals and small businesses are becoming more and more involved in E-commerce everyday. With more online commerce comes the need for more service providers, secure lines, the ability to perform credit card transactions across the Internet, and to assure clients and customers that the goods and services being ordered or requested will in fact be provided. As most experts will tell you, the Internet is still in its infancy and as the hardware allows information to move faster and faster, and the web infrastructure continues to grow, Internet commerce will not only become more prevalent, it will become a way of life.
E-commerce is becoming more and more prevalent and is no longer just the domain of large companies or "tech" companies. Individuals and small businesses are becoming more and more involved in E-commerce everyday. With more online commerce comes the need for more service providers, secure lines, the ability to perform credit card transactions across the Internet, and to assure clients and customers that the goods and services being ordered or requested will in fact be provided. As most experts will tell you, the Internet is still in its infancy and as the hardware allows information to move faster and faster, and the web infrastructure continues to grow, Internet commerce will not only become more prevalent, it will become a way of life.
Cyberlaw in usa:(What is copyright law in usa:)
Copyright is a form of intellectual property protection that has become more and more prevalent as the Internet has grown. Under copyright law, the party that is not the author of an original work or does not have an agreement with the creator of an original work cannot use that material without providing the original creator some form of compensation. The many forms of written material and images published throughout the Internet are subject to copyright law. Very recently, the United States Congress enacted the Digital Millennium Copyright Act, which is specifically intended to protect Internet related content and images. Pursuant to this act, the owner of Internet content or images can require that a person or company using that content or image without permission be required to cease using those materials.
Copyright law has been greatly expanded by the Internet by such concerns as framing, deep linking and improper use of metatags. The enforcement of copyright law can sometimes be as simple as a formal request to the "borrower" of the material and can sometimes be as complicated as a trial in a local Federal Court. Our nationwide resources and attorneys are well versed in what constitutes a copyright and how a copyright can be enforced or bypassed. Every web developer, content provider, graphic artists and entrepreneur on the Internet should be very cognizant and careful with copyrighted materials.
Copyright law has been greatly expanded by the Internet by such concerns as framing, deep linking and improper use of metatags. The enforcement of copyright law can sometimes be as simple as a formal request to the "borrower" of the material and can sometimes be as complicated as a trial in a local Federal Court. Our nationwide resources and attorneys are well versed in what constitutes a copyright and how a copyright can be enforced or bypassed. Every web developer, content provider, graphic artists and entrepreneur on the Internet should be very cognizant and careful with copyrighted materials.
What is cyberlaw?
Cyberlaw definition:
_Rapidly evolving area of civil and criminal law as applicable to the use of computers, and activities performed and transactions conducted over internet and other networks.
_The area of law dealing with the use of computers and the Internet and the exchange of communications and information thereon, including related issues concerning such communications and information as the protection of intellectual property rights, freedom of speech, and public access to information.
_Broadly speaking, cyberlaw is law affecting networked information environments. This includes the Internet, most software and web services, databases, and most other information systems. It also includes the social, political, and economic aspects of these systems.
Definition of Malaysia cyberlaw:
Best Answer - Chosen by Voters
_An ill-defined, set of legal regulations rushed out to control the use of informaion and for the creation, distribution and receiving of data and information from a network or system of electronic computers and messaging systems; so as to prevent the general public free and unhindred access to such facts and information which are deemed to be against or unfavorable to the Government....
_Rapidly evolving area of civil and criminal law as applicable to the use of computers, and activities performed and transactions conducted over internet and other networks.
_The area of law dealing with the use of computers and the Internet and the exchange of communications and information thereon, including related issues concerning such communications and information as the protection of intellectual property rights, freedom of speech, and public access to information.
_Broadly speaking, cyberlaw is law affecting networked information environments. This includes the Internet, most software and web services, databases, and most other information systems. It also includes the social, political, and economic aspects of these systems.
Definition of Malaysia cyberlaw:
Best Answer - Chosen by Voters
_An ill-defined, set of legal regulations rushed out to control the use of informaion and for the creation, distribution and receiving of data and information from a network or system of electronic computers and messaging systems; so as to prevent the general public free and unhindred access to such facts and information which are deemed to be against or unfavorable to the Government....
Subscribe to:
Comments (Atom)