Monday, July 29, 2019

Please refer to the attachment Essay Example | Topics and Well Written Essays - 500 words - 1

Please refer to the attachment - Essay Example The Convention on Cybercrime is an international treaty to encounter all the cybercrimes associated with computer and internet. It was strategized by Council of Europe on 23rd November 2001 which came into enforcement on 1st July 2004. This convention is also known as Budapest Convention. Canada, Japan and China also participated in the Convention. The Convention of Cybercrimes gave a platform to all the nations across the world to adopt various techniques and strategies to investigate and take serious measures against any group or an individual that poses cyber threat to any other group or an individual. The convention provoked the participating nations to adopt a uniform and common criminal policy in order to protect the society from any cybercrime or activities that may harm the reputation of an individual or a group. The Convention highlighted various emerging threats associated with the usage of computer and the internet which include copyright infringements, identity theft, financial frauds, child pornography, unlawful access to sensitive data and information, virus attacks on sensitive computers and database and misuse of devices. This is a good step taken by Council of Europe which ensures protection of individuals and the groups against all the ill-legal activities associated with cybercrimes. The treaty stresses all the countries to play an effective role in this regard. This step will enhance greater international harmony among the nations and they will work together against all such groups who pose threats to an individual or to a group when working online. The nations were in dire need to establish a uniform code of conduct and a uniform legal policy to encounter such issues. However, the treaty needs to elaborate more widely the actions to be taken against any culprit found associated with such criminal activities and how the nations will deal with such threats on a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.