This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Law

Effective cybersecurity laws

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Effective cybersecurity laws

Recently cybersecurity has become an important subject due to advancements in technology and the diffusion of the internet. Despite playing a vital role in enhancing communication, trade, and facilitating globalization, the internet has resulted in cybercrimes. Hackers and attackers have devised techniques to circumvent cybersecurity protocols, hence posing a threat to user data (Mačák, 2017). The cybersecurity field comprises of a range of challenges that focus on protecting user systems and digital information from access to unauthorized users. However, existing cybersecurity laws have not been effective in eliminating cyber threats. Changes need to be made in the law to increase insecurity and find a punishable way to stop cybercriminals. Effective cybersecurity laws should define the user’s level of privacy, how stringent these laws will catch and punish criminals who infringe upon the rights of people, and whether the rights to privacy should be sacrificed.

The current laws in cybersecurity are not effective at increasing security and find punishable ways to stop cybercriminals. Laws should be tailored towards increasing user privacy by establishing the kind of data to be collected, what are the permissible users to access this data, and how long the data should be retained. Mačák, 2017) states that the nature of malware, including bots, worms, and viruses, has significantly shifted from disrupting the user from accessing services towards actively seeking financial gain. This has necessitated organizations and users to employ practices like implementing application control rules to block specific threats. Moreover, these practices are not enough in increasing user security and privacy. There should be strict cyber laws in place that punish cybercriminals for fighting internet-related crimes and promote safer online conduct.

On the other hand, cybersecurity policies and laws should be tailored towards respecting and protecting human rights, instead of curtailing them. The Electronic Communications Privacy Act of 1986 protects specific oral, electronic, and wire communications from unauthorized access, interception disclosure, and use  (Mačák, 2017). The ECPA has been effective at punishing cybercriminals since violations under the Act are subject to penalties from up to ten years for repeat violations for an improper purpose as well as up to one year for first-time violations without an improper purpose. Nonetheless, new laws should be designed and enacted that stipulate stringent sentences to cybercriminals who perpetrate active and passive attacks. Accordingly, the effectiveness of these laws must establish how the violators have intercepted information of data and hence threatened the secrecy.

Finally, while establishing cybercrime laws, it is necessary to ensure that the privacy rights of internet users are not sacrificed. Internet Service Providers, websites, applications, and other online services should ensure the security and privacy of users by developing comprehensive privacy policies  (Mačák, 2017). These services vendors may violate cybersecurity laws by lacking privacy policies, having privacy policies that are hard to find within their platforms, and having privacy policies that di not encompass all the information required by law. Additionally, a violation of privacy law may occur if internet service providers have privacy policies that do not follow their privacy policies or that do not notify users of the significant changes to their privacy policy.

In conclusion, to ensure the cybersecurity and privacy of the users, it is necessary to establish cyber laws that clearly define the privacy of users. The cyber laws should be stringent in punishing cyber criminals for promoting safer online conduct. Furthermore, the effectiveness of these laws should establish how the violators have intercepted information of data and hence threatened the secrecy.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask