This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ment.
There have been efforts to standardize the different countries’ approach to computer crimes, because they happen so easily over international boundaries. Although it
is very easy for an attacker in China to send packets through the Internet to a bank in
Saudi Arabia, it is very difficult (because of legal systems, cultures, and politics) to motivate these governments to work together.
The Council of Europe (CoE) Convention on Cybercrime is one example of an attempt to create a standard international response to cybercrime. In fact, it is the first
international treaty seeking to address computer crimes by coordinating national laws
and improving investigative techniques and international cooperation. The Convention’s objectives include the creation of a framework for establishing jurisdiction and
extradition of the accused. For example, extradition can only take place when the event
is a crime in both jurisdictions.
Many companies communicate internationally every day through e-mail, telephone
lines, satellites, fiber cables, and long-distance wireless transmission. It is important for
a company to research the laws of different countries pertaining to information flow
Global organizations that move data across other country boundaries must be
aware of and follow the Organisation for Economic Co-operation and Development
(OECD) Guidelines and transborder information flow rules, which were addressed in
Chapter 3. Since most countries have a different set of laws pertaining to the definition
of private data and how it should be protected, international trade and business gets
more convoluted and can negatively affect the economy of nations. The OECD is an
international organization that helps different governments come together and tackle
the economic, social, and governance challenges of a globalized economy. Because of
this, the OECD came up with guidelines for the various countries to follow so that data
are properly protected and everyone follows the same...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12