While using an employer’s computer, employees have a right to the privacy as prescribed by universal human rights universally. This is because as an employee, one has her privet life that does not in way relate to activities of the work place. There are personal financial transactions that they may be involved in. if employers are able to interfere with the employees’ privacy, and then it may pose a security challenge if for instance the employer shares private information about employees with other people. If conducting off work investigations, the employer needs to restrict himself to matters that affect work and not the personal life of an employee. Off-work but online activities of employees will have an impact on employment if they discuss matters related to the job. These may be discussion about the financial activities to friends, the location of the company and the performance of the company. Al these may have negative impact to the company.
CLICK HERE FOR HELP ON THIS PAPER……………………. According to Wall (2001), a hacker is proficient with programming and computers to an advance level that they can know what is coming in and out of a system while there is no illegality of their activities. On the other hand a cracker is a person who uses their computer proficiency for personal benefit against the law. Activities of a cracker may include, stealing data, distributing bank virus and changing bank accounts among others. Simply what a hacker does with his knowledge of computers is what can define him to be a cracker or not. It can therefore be said that all hackers are not crackers but all crackers are hackers. Many people use the two words interchangeably due to lack of information. When submitting data such as credit card information, consumers should be careful and end ensure that no recording or reproduction of the information is carried out. They should be cautious about who is asking for the information since it may lead to loss of funds in a scam. P2P sites cerate unforeseen problems since even fraudsters may access the site and collect information that they may use to cone many pole all over the world. In conventional crimes, one is bale to see whoever is committing the crime which can help in investigations. While, in internet crimes it becomes more difficult to have the physical evidence of the offenders. Clear distinction should be drawn between these two types of crimes since they occur in a different manner and may different number of people. The consequences of internet crime may affect a lot of people unknowingly compared to conventional crimes. The Wiki Leaks, a global website that offered to publish secret US government documents is a case that contains the four elements of Internet criminal liability. The site revealed thousands of details about the American war in Afghanistan Copyrighted materials such as music should be highly protected and all downloads disabled such that one can only be listened to the music. For downloading, one must be given the permission by relevant parties after paying for the song. P2P sites should be made illegal to curb piracy online. This should be done by developing a universal site that will be accessed after permission form a union of artists. The site, http://cyberwhitepaper.dpmc.gov.au/white-paper/protecting-and-promoting-australias-digital-economy/crime-online-threatening-confidence-in-the-digital-economyprovides information about the consequences of cyber crime. Form the site I learnt the devastative effects of cyber crime and I was surprised how serious the crime is. The internet is sophisticating the future of crime and a solution to this can be effective scrutiny of internet sites to curb criminal activities.
Wall, D. (2001). Crime and the Internet. New York: Routledge.