Unauthorized access to information that an organization is trying to proctect, it is defined as any type of activity in which the internet is used, a private or public network or a domestic computer system with objectives such as destroying or damaging computers, electronic media and internet network.
who has the rigth to reproduction appropriation and distribution for profit and a large scale of content (software,video,music.) that to do not have a license or permission from its author.
For example:
-Low -tech shoulder surfing.
-High-tech hacking.
It usually generates a computer or technological support for these actions. One of the best know content piracy practice is software.
Although most of companies producing c-ontent, both software development companies and hardware and/or software brands.
who has the rigth to reproduction appropriation and distribution for profit and a large scale of content (software,video,music.) that to do not have a license or permission from its author.
For example:
-Low -tech shoulder surfing.
-High-tech hacking.
It usually generates a computer or technological support for these actions. One of the best know content piracy practice is software.
Although most of companies producing c-ontent, both software development companies and hardware and/or software brands.
"Types of transgressions"
*Software piracy.
*Music piracy.
*Video games piracy.
*Movie piracy.
Examples:
-Ilicit access to computer systems .
-Unlawful interception of computer data.
-interference in the operation of a computer system.
-Abuse of devices that facilitate the commission of crimes.
For more information visit:
https://www.youtube.com/watch?v=lskwU3kw29ohttps://www.youtube.com/watch?v=lskwU3kw29o
http://www.ordenjuridico.gob.mx/Congreso/pdf/120.pdf
For more information visit:
https://www.youtube.com/watch?v=lskwU3kw29ohttps://www.youtube.com/watch?v=lskwU3kw29o
http://www.ordenjuridico.gob.mx/Congreso/pdf/120.pdf
No hay comentarios.:
Publicar un comentario